Sciweavers

5488 search results - page 1008 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
ICDCS
2009
IEEE
16 years 1 months ago
QVS: Quality-Aware Voice Streaming for Wireless Sensor Networks
Recent years have witnessed the pilot deployments of audio or low-rate video wireless sensor networks for a class of mission-critical applications including search and rescue, sec...
Liqun Li, Guoliang Xin, Limin Sun, Yan Liu
EUROSYS
2007
ACM
16 years 1 months ago
Container-based operating system virtualization: a scalable, high-performance alternative to hypervisors
Hypervisors, popularized by Xen and VMware, are quickly becoming commodity. They are appropriate for many usage scenarios, but there are scenarios that require system virtualizatio...
Stephen Soltesz, Herbert Pötzl, Marc E. Fiucz...
ESSOS
2010
Springer
16 years 1 months ago
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests
Protecting users in the ubiquitous online world is becoming more and more important, as shown by web application security – or the lack thereof – making the mainstream news. On...
Philippe De Ryck, Lieven Desmet, Thomas Heyman, Fr...

Publication
195views
16 years 16 days ago
Detecting Motion Patterns via Direction Maps with Application to Surveillance
Detection of motion patterns in video data can be significantly simplified by abstracting away from pixel intensity values towards representations that explicitly and compactly ca...
Jacob M. Gryn, Richard P. Wildes, John K. Tsotsos
HICSS
2009
IEEE
88views Biometrics» more  HICSS 2009»
15 years 11 months ago
Automatic Voltage Controllers for South Korean Power System
The paper proposes two automatic voltage controllers for the South Korean power system. Simulation results from detailed Korean power-flow models show that the controllers can pro...
Xing Liu, Vaithianathan Venkatasubramanian, Tae-Ky...
« Prev « First page 1008 / 1098 Last » Next »