Sciweavers

449 search results - page 79 / 90
» Protecting the Hosted Application Server
Sort
View
JSAC
2006
137views more  JSAC 2006»
13 years 9 months ago
Adaptive Defense Against Various Network Attacks
In defending against various network attacks, such as distributed denial-of-service (DDoS) attacks or worm attacks, a defense system needs to deal with various network conditions a...
Cliff Changchun Zou, Nick G. Duffield, Donald F. T...
TASLP
2002
82views more  TASLP 2002»
13 years 8 months ago
Graceful degradation of speech recognition performance over packet-erasure networks
Abstract--This paper explores packet loss recovery for automatic speech recognition (ASR) in spoken dialog systems, assuming an architecture in which a lightweight client communica...
Constantinos Boulis, Mari Ostendorf, Eve A. Riskin...
WIAS
2010
102views more  WIAS 2010»
13 years 7 months ago
Information security underlying transparent computing: Impacts, visions and challenges
The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...
Yaoxue Zhang, Laurence Tianruo Yang, Yuezhi Zhou, ...
SP
2010
IEEE
181views Security Privacy» more  SP 2010»
13 years 7 months ago
SCiFI - A System for Secure Face Identification
Abstract--We introduce SCiFI, a system for Secure Computation of Face Identification. The system performs face identification which compares faces of subjects with a database of re...
Margarita Osadchy, Benny Pinkas, Ayman Jarrous, Bo...
IEEEIAS
2009
IEEE
13 years 6 months ago
An Improved Scheme of Single Sign-on Protocol
In order to avoid security threats caused by password attack and replay attack in single sign-on protocal, the most methods on sovling these issues are making use of complicated te...
Yang Jian