Sciweavers

13214 search results - page 2521 / 2643
» Pseudorandomness for network algorithms
Sort
View
AINA
2008
IEEE
15 years 11 months ago
Multiple-Resource Request Scheduling for Differentiated QoS at Website Gateway
Differentiated quality of service is a way for a website operator to provide different service levels to its clients. Traditional HTTP request scheduling schemes can achieve this,...
Ying-Dar Lin, Ching-Ming Tien, Shih-Chiang Tsao, R...
NDSS
2008
IEEE
15 years 11 months ago
Usable PIR
In [22] we showed that existing single-server computational private information retrieval (PIR) protocols for the purpose of preserving client access patterns leakage are orders o...
Peter Williams, Radu Sion
NDSS
2008
IEEE
15 years 11 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
ICNP
2007
IEEE
15 years 10 months ago
A Simple Model for Analyzing P2P Streaming Protocols
— P2P streaming tries to achieve scalability (like P2P file distribution) and at the same time meet real-time playback requirements. It is a challenging problem still not well u...
Yipeng Zhou, Dah-Ming Chiu, John C. S. Lui
ICNSC
2007
IEEE
15 years 10 months ago
Towards Robot-Assisted Mass-Casualty Triage
Abstract— This paper provides a discussion on how teleoperated robots could be utilized to do the simple triage of victims of a multiple casualty incident. Previous work in the a...
Carolina Chang, Robin R. Murphy
« Prev « First page 2521 / 2643 Last » Next »