Sciweavers

291 search results - page 22 / 59
» Linear Types for Packet Processing
Sort
View
ESORICS
2000
Springer
13 years 11 months ago
Authentication and Confidentiality via IPSEC
The IP security protocols (IPsec) may be used via security gateways that apply cryptographic operations to provide security services to datagrams, and this mode of use is supported...
Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer
CORR
2008
Springer
90views Education» more  CORR 2008»
13 years 7 months ago
Dynamic Connectivity in ALOHA Ad Hoc Networks
We consider an ad hoc network which uses multihop routing and slotted ALOHA for its MAC contention. We show that the minimum time required for a packet to reach the destination fr...
Radha Krishna Ganti, Martin Haenggi
JRTIP
2008
300views more  JRTIP 2008»
13 years 7 months ago
Real-time human action recognition on an embedded, reconfigurable video processing architecture
Abstract In recent years, automatic human action recognition has been widely researched within the computer vision and image processing communities. Here we propose a realtime, emb...
Hongying Meng, Michael Freeman, Nick Pears, Chris ...
ICMLA
2008
13 years 9 months ago
Semi-supervised IFA with Prior Knowledge on the Mixing Process: An Application to a Railway Device Diagnosis
Independent Factor Analysis (IFA) is a well known method used to recover independent components from their linear observed mixtures without any knowledge on the mixing process. Su...
Etienne Côme, Zohra Leila Cherfi, Latifa Ouk...
ICWS
2004
IEEE
13 years 9 months ago
Logic-based Web Services Composition: From Service Description to Process Model
This paper introduces a method for automatic composition of Semantic Web services using Linear Logic (LL) theorem proving. The method uses Semantic Web service language (DAML-S) f...
Jinghai Rao, Peep Küngas, Mihhail Matskin