Sciweavers

334 search results - page 50 / 67
» Inapproximability of Survivable Networks
Sort
View
SECON
2010
IEEE
13 years 6 months ago
Using BGP in a Satellite-Based Challenged Network Environment
Once, satellites were considered an important option for creating global Internet access. However, for a period of time, satellites were supplanted by other ground-based technologi...
Roman Chertov, Kevin C. Almeroth
ICIP
2005
IEEE
14 years 10 months ago
Resistance analysis of scalable video fingerprinting systems under fair collusion attacks
Digital fingerprinting is an important tool in multimedia forensics to trace traitors and protect multimedia content after decryption. This paper addresses the enforcement of digi...
H. Vicky Zhao, K. J. Ray Liu
ICCAD
2006
IEEE
124views Hardware» more  ICCAD 2006»
14 years 5 months ago
Combinatorial algorithms for fast clock mesh optimization
We present a fast and efficient combinatorial algorithm to simultaneously identify the candidate locations as well as the sizes of the buffers driving a clock mesh. Due to the hi...
Ganesh Venkataraman, Zhuo Feng, Jiang Hu, Peng Li
BLISS
2008
IEEE
14 years 3 months ago
Using a Cognitive Architecture to Automate Cyberdefense Reasoning
The CSISM project is designing and implementing an automated cyberdefense decision-making mechanism with expert-level ability. CSISM interprets alerts and observations and takes d...
D. Paul Benjamin, Partha Pratim Pal, Franklin Webb...
SAINT
2007
IEEE
14 years 2 months ago
Local Production, Local Consumption Peer-to-Peer Architecture for a Dependable and Sustainable Social Infrastructure
Peer-to-peer (P2P) is a system of overlay networks such that participants can potentially take symmetrical roles. This translates itself into a design based on the philosophy of L...
Kenji Saito, Eiichi Morino, Yoshihiko Suko, Takaak...