Sciweavers

804 search results - page 112 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
TWC
2008
103views more  TWC 2008»
15 years 4 months ago
Performance analysis of a cross-layer handoff ordering scheme in wireless networks
In this paper we propose a cross-layer handoff ordering scheme. The frame success rate (FSR) is adopted as the basis of prioritization. Different quality of service (QoS) requireme...
Po-Chiang Lin, Tsungnan Lin, Chiapin Wang
ATAL
2009
Springer
15 years 11 months ago
Real-time expressive gaze animation for virtual humans
Gaze is an extremely important aspect of human face to face interaction. Over the course of an interaction, a single individual’s gaze can perform many different functions, such...
Marcus Thiébaux, Brent Lance, Stacy Marsell...
ESOP
2004
Springer
15 years 10 months ago
Trust Management in Strand Spaces: A Rely-Guarantee Method
We show how to combine trust management theories with nonce-based cryptographic protocols. The strand space framework for protocol analysis is extended by associating formulas from...
Joshua D. Guttman, F. Javier Thayer, Jay A. Carlso...
FUN
2010
Springer
263views Algorithms» more  FUN 2010»
15 years 9 months ago
Fighting Censorship with Algorithms
In countries such as China or Iran where Internet censorship is prevalent, users usually rely on proxies or anonymizers to freely access the web. The obvious difficulty with this a...
Mohammad Mahdian
LCN
2005
IEEE
15 years 10 months ago
Differentiation of Downlink 802.11e Traffic in the Virtual Collision Handler
— A number of analytical models have been proposed to describe the priority schemes of the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard. EDCA...
Paal Engelstad, Olav N. Østerbø