Sciweavers

501 search results - page 8 / 101
» Redundancy and Diversity in Security
Sort
View
CCS
2004
ACM
14 years 2 months ago
On achieving software diversity for improved network security using distributed coloring algorithms
It is widely believed that diversity in operating systems, software packages, and hardware platforms will decrease the virulence of worms and the effectiveness of repeated applic...
Adam J. O'Donnell, Harish Sethu
CCS
2005
ACM
14 years 2 months ago
On the cost-ineffectiveness of redundancy in commercial P2P computing
We present a game-theoretic model of the interactions between server and clients in a constrained family of commercial P2P computations (where clients are financially compensated...
Matthew Yurkewych, Brian Neil Levine, Arnold L. Ro...
ICML
2008
IEEE
14 years 10 months ago
Predicting diverse subsets using structural SVMs
In many retrieval tasks, one important goal involves retrieving a diverse set of results (e.g., documents covering a wide range of topics for a search query). First of all, this r...
Yisong Yue, Thorsten Joachims
IEEEMSP
2002
IEEE
126views Multimedia» more  IEEEMSP 2002»
14 years 2 months ago
Channel-adaptive video streaming using packet path diversity and rate-distortion optimized reference picture selection
— In this paper, we present error-resilient Internet video transmission using path diversity and rate-distortion optimized reference picture selection. Under this scheme, the opt...
Yi J. Liang, Eric Setton, Bernd Girod
ICIP
2003
IEEE
14 years 10 months ago
Multihypothesis motion compensation in the redundant wavelet domain
Multihypothesis motion compensation is extended into the transform domain by using a redundant wavelet transform to produce multiple predictions that are diverse in transform phas...
Suxia Cui, Yonghui Wang, James E. Fowler