Sciweavers

731 search results - page 132 / 147
» New Security Results on Encrypted Key Exchange
Sort
View
JUCS
2010
114views more  JUCS 2010»
13 years 2 months ago
On Reliable Platform Configuration Change Reporting Mechanisms for Trusted Computing Enabled Platforms
: One of the most important use-cases of Trusted Computing is Remote Attestation. It allows platforms to get a trustworthy proof of the loaded software and current configuration of...
Kurt Dietrich
ICIAP
2009
ACM
14 years 8 months ago
Pathnodes Integration of Standalone Particle Filters for People Tracking on Distributed Surveillance Systems
In this paper, we present a new approach to object tracking based on batteries of particle filter working in multicamera systems with non overlapped fields of view. In each view th...
Roberto Vezzani, Davide Baltieri, Rita Cucchiara
GLOBECOM
2007
IEEE
14 years 1 months ago
Adaptive Mobility Management for IP/MPLS-Based Wireless Networks: A Proposal and Analysis
Abstract—In this paper, we propose a new adaptive MPLSenabled micro-mobility management scheme designed to track efficiently the mobility of nodes so as to minimize both handoff...
Rami Langar, Nizar Bouabdallah, Raouf Boutaba
INFORMATICALT
2006
100views more  INFORMATICALT 2006»
13 years 7 months ago
Optimal Agreement in a Scale-Free Network Environment
Generally, the task in a distributed system must achieve an agreement. It requires a set of processors to agree on a common value even if some components are corrupted. There are s...
Shu-Ching Wang, Kuo-Qin Yan, Mao-Lun Chiang
DLOG
2010
13 years 5 months ago
An Algebraic Approach to Dynamic Epistemic Logic
Dynamic epistemic logic plays a key role in reasoning about multi-agent systems. Past approaches to dynamic epistemic logic have typically been focused on actions whose primary pur...
Prakash Panangaden, Caitlin Phillips, Doina Precup...