Sciweavers

1565 search results - page 276 / 313
» Optimizing Layered Communication Protocols
Sort
View
133
Voted
CNSM
2010
14 years 12 months ago
Automated and secure IPv6 configuration in enterprise networks
Over the last decade, IPv6 has established itself as the most mature network protocol for the future Internet. Its recent deployment in core networks of operators, its availability...
Frederic Beck, Olivier Festor, Isabelle Chrisment,...
126
Voted
IUI
2010
ACM
15 years 11 months ago
A POMDP approach to P300-based brain-computer interfaces
Most of the previous work on non-invasive brain-computer interfaces (BCIs) has been focused on feature extraction and classification algorithms to achieve high performance for the...
Jaeyoung Park, Kee-Eung Kim, Sungho Jo
ACMACE
2006
ACM
15 years 8 months ago
Wireless home entertainment center: reducing last hop delays for real-time applications
Future digital entertainment services available to home users will share several characteristics: i) they will be deployed and delivered through the Internet, ii) a single media c...
Claudio E. Palazzi, Giovanni Pau, Marco Roccetti, ...
117
Voted
INFOCOM
2009
IEEE
15 years 9 months ago
Graceful Network Operations
—A significant fraction of network events (such as topology or route changes) and the resulting performance degradation stem from premeditated network management and operational...
Saqib Raza, Yuanchen Zhu, Chen-Nee Chuah
132
Voted
CRYPTO
2012
Springer
277views Cryptology» more  CRYPTO 2012»
13 years 5 months ago
Multiparty Computation from Somewhat Homomorphic Encryption
We propose a general multiparty computation protocol secure against an active adversary corrupting up to n−1 of the n players. The protocol may be used to compute securely arithm...
Ivan Damgård, Valerio Pastro, Nigel P. Smart...