Sciweavers

5384 search results - page 1029 / 1077
» Open Standards Requirements
Sort
View
ACSAC
2009
IEEE
14 years 1 months ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...
CASES
2007
ACM
14 years 1 months ago
A simplified java bytecode compilation system for resource-constrained embedded processors
Embedded platforms are resource-constrained systems in which performance and memory requirements of executed code are of critical importance. However, standard techniques such as ...
Carmen Badea, Alexandru Nicolau, Alexander V. Veid...
COMSWARE
2007
IEEE
14 years 1 months ago
On Configuring BGP Route Reflectors
The Border Gateway Protocol (BGP) is the standard protocol for exchanging routing information between border routers of Autonomous Systems (ASes) in today's Internet. Within a...
Yuri Breitbart, Minos N. Garofalakis, Anupam Gupta...
EUROCRYPT
2007
Springer
14 years 1 months ago
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
We show an efficient secure two-party protocol, based on Yao's construction, which provides security against malicious adversaries. Yao's original protocol is only secur...
Yehuda Lindell, Benny Pinkas
AMR
2006
Springer
108views Multimedia» more  AMR 2006»
14 years 1 months ago
Variation of Relevance Assessments for Medical Image Retrieval
Abstract. Evaluation is crucial for the success of most research domains, and image retrieval is no exception to this. Recently, several benchmarks have been developed for visual i...
Henning Müller, Paul Clough, William R. Hersh...
« Prev « First page 1029 / 1077 Last » Next »