Sciweavers

5476 search results - page 1003 / 1096
» Resettably Secure Computation
Sort
View
ICMCS
2006
IEEE
371views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Automatic Counting of Interacting People by using a Single Uncalibrated Camera
Automatic counting of people, entering or exiting a region of interest, is very important for both business and security applications. This paper introduces an automatic and robus...
Senem Velipasalar, Ying-li Tian, Arun Hampapur
ICNP
2006
IEEE
15 years 10 months ago
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes
— The Internet’s interdomain routing protocol, BGP, is vulnerable to a number of damaging attacks, which often arise from operator misconfiguration. Proposed solutions with st...
Josh Karlin, Stephanie Forrest, Jennifer Rexford
ICRA
2006
IEEE
256views Robotics» more  ICRA 2006»
15 years 10 months ago
An Ankle-foot Emulation System for the Study of Human Walking Biomechanics
– Although below-knee prostheses have been commercially available for some time, today’s devices are completely passive, and consequently, their mechanical properties remain fi...
Samuel K. Au, Peter Dilworth, Hugh M. Herr
INFOCOM
2006
IEEE
15 years 10 months ago
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol
Skype is a peer-to-peer VoIP client developed by KaZaa in 2003. Skype claims that it can work almost seamlessly across NATs and firewalls and has better voice quality than the MSN...
Salman Baset, Henning Schulzrinne
143
Voted
LCN
2006
IEEE
15 years 10 months ago
The Internet Group Management Protocol with Access Control (IGMP-AC)
IP Multicast is best known for its bandwidth conservation and lower resource utilization. The classical model of multicast makes it difficult to permit access only to authorized ...
Salekul Islam, J. William Atwood
« Prev « First page 1003 / 1096 Last » Next »