Sciweavers

2699 search results - page 401 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
NETGAMES
2004
ACM
14 years 3 months ago
Zoned federation of game servers: a peer-to-peer approach to scalable multi-player online games
Today’s Multi-player Online Games (MOGs) are challenged by infrastructure requirements, because of their server-centric nature. Peer-to-peer networks are an interesting alternat...
Takuji Iimura, Hiroaki Hazeyama, Youki Kadobayashi
WOTUG
2007
13 years 11 months ago
Modeling and Analysis of the AMBA Bus Using CSP and B
Abstract. In this paper, we present a formal model and analysis of the AMBA Advanced High-performance Bus (AHB) on-chip bus. The model is given in CSP B—an integration of the pro...
Alistair A. McEwan, Steve Schneider
MOBIHOC
2012
ACM
12 years 19 days ago
Oblivious low-congestion multicast routing in wireless networks
We propose a routing scheme to implement multicast communication in wireless networks. The scheme is oblivious, compact, and completely decentralized. It is intended to support dy...
Antonio Carzaniga, Koorosh Khazaei, Fabian Kuhn
CVPR
2012
IEEE
12 years 18 days ago
Detecting texts of arbitrary orientations in natural images
With the increasing popularity of practical vision systems and smart phones, text detection in natural scenes becomes a critical yet challenging task. Most existing methods have f...
Cong Yao, Xiang Bai, Wenyu Liu, Yi Ma, Zhuowen Tu
ACISICIS
2009
IEEE
14 years 5 months ago
BackupIT: An Intrusion-Tolerant Cooperative Backup System
Reliable storage of large amounts of data is always a delicate issue. Availability, efficiency, data integrity, and confidentiality are some features a data backup system should...
Sérgio Raymundo Loest, Marcelo Cheminn Madr...