Sciweavers

902 search results - page 98 / 181
» Opening Address
Sort
View
DSN
2007
IEEE
14 years 3 months ago
Protecting Cryptographic Keys from Memory Disclosure Attacks
Cryptography has become an indispensable mechanism for securing systems, communications and applications. While offering strong protection, cryptography makes the assumption that ...
Keith Harrison, Shouhuai Xu
DSN
2007
IEEE
14 years 3 months ago
SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks
Sleep-wake protocols are critical in sensor networks to ensure long-lived operation. However, an open problem is how to develop efficient mechanisms that can be incorporated with ...
Issa Khalil, Saurabh Bagchi, Ness B. Shroff
GLOBECOM
2007
IEEE
14 years 3 months ago
Heuristics for the Design and Optimization of Streaming Content Distribution Networks
Abstract— The design of efficient and scalable streaming Content Distribution Networks (CDNs) is an open problem of great economic interest. A key decision is the number of repl...
Sandjai Bhulai, Robert D. van der Mei, Mengxiao Wu
ICIP
2007
IEEE
14 years 3 months ago
Color Management of Printers by Regression over Enclosing Neighborhoods
A popular color management standard for controlling color reproduction is the ICC color profile. The core of the ICC profile is a look-up-table which maps a regular grid of devi...
Erika M. Chin, Eric K. Garcia, Maya R. Gupta
ICNP
2007
IEEE
14 years 3 months ago
Cooperation Between Stations in Wireless Networks
Abstract— In a wireless network, mobile nodes (MNs) repeatedly perform tasks such as layer 2 (L2) handoff, layer 3 (L3) handoff and authentication. These tasks are critical, part...
Andrea G. Forte, Henning Schulzrinne