Sciweavers

5665 search results - page 1027 / 1133
» Introduction to Computer Security
Sort
View
ICMCS
2006
IEEE
116views Multimedia» more  ICMCS 2006»
14 years 3 months ago
SIKAS: A Scalable Distributed Key Management Scheme for Dynamic Collaborative Groups
The increasing popularity of distributed and collaborative applications prompts the need for secure communication in collaborative groups. Some distributed collaborative key manag...
Jiang Zhang, Jian-Guang Luo, Bin Li, Shiqiang Yang
ICMCS
2006
IEEE
371views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Automatic Counting of Interacting People by using a Single Uncalibrated Camera
Automatic counting of people, entering or exiting a region of interest, is very important for both business and security applications. This paper introduces an automatic and robus...
Senem Velipasalar, Ying-li Tian, Arun Hampapur
ICNP
2006
IEEE
14 years 3 months ago
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes
— The Internet’s interdomain routing protocol, BGP, is vulnerable to a number of damaging attacks, which often arise from operator misconfiguration. Proposed solutions with st...
Josh Karlin, Stephanie Forrest, Jennifer Rexford
ICRA
2006
IEEE
256views Robotics» more  ICRA 2006»
14 years 3 months ago
An Ankle-foot Emulation System for the Study of Human Walking Biomechanics
– Although below-knee prostheses have been commercially available for some time, today’s devices are completely passive, and consequently, their mechanical properties remain fi...
Samuel K. Au, Peter Dilworth, Hugh M. Herr
INFOCOM
2006
IEEE
14 years 3 months ago
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol
Skype is a peer-to-peer VoIP client developed by KaZaa in 2003. Skype claims that it can work almost seamlessly across NATs and firewalls and has better voice quality than the MSN...
Salman Baset, Henning Schulzrinne
« Prev « First page 1027 / 1133 Last » Next »