Sciweavers

13214 search results - page 2551 / 2643
» Pseudorandomness for network algorithms
Sort
View
CCS
2007
ACM
15 years 10 months ago
Robust group key agreement using short broadcasts
A group key agreement protocol (GKA) allows a set of players to establish a shared secret key which can be used to secure a subsequent communication. Several efficient constantrou...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
GECCO
2007
Springer
159views Optimization» more  GECCO 2007»
15 years 10 months ago
Evolutionary hypernetwork models for aptamer-based cardiovascular disease diagnosis
We present a biology-inspired probabilistic graphical model, called the hypernetwork model, and its application to medical diagnosis of disease. The hypernetwork models are a way ...
JungWoo Ha, Jae-Hong Eom, Sung-Chun Kim, Byoung-Ta...
GIS
2007
ACM
15 years 10 months ago
Cell-based generalization of 3D building groups with outlier management
In this paper, we present a technique that generalizes 3D building groups of virtual 3D city models according to a cell structure that is derived from infrastructure networks. In ...
Tassilo Glander, Jürgen Döllner
125
Voted
INFOCOM
2006
IEEE
15 years 10 months ago
Adaptive Statistical Optimization Techniques for Firewall Packet Filtering
— Packet filtering plays a critical role in the performance of many network devices such as firewalls, IPSec gateways, DiffServ and QoS routers. A tremendous amount of research...
Hazem Hamed, Adel El-Atawy, Ehab Al-Shaer
MM
2006
ACM
93views Multimedia» more  MM 2006»
15 years 10 months ago
Scaling laws and tradeoffs in peer-to-peer live multimedia streaming
It is well-known that live multimedia streaming applications operate more efficiently when organized in peer-to-peer (P2P) topologies, since peer upload capacities are utilized t...
Tara Small, Ben Liang, Baochun Li
« Prev « First page 2551 / 2643 Last » Next »