Sciweavers

830 search results - page 59 / 166
» Responsiveness without interrupts
Sort
View
PERCOM
2005
ACM
14 years 7 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
MM
2009
ACM
144views Multimedia» more  MM 2009»
14 years 2 months ago
Peer-assisted view-dependent progressive mesh streaming
Progressive mesh streaming is increasingly used in 3D networked applications, such as online games, virtual worlds, and digital museums. To scale such applications to a large numb...
Wei Cheng, Dan Liu, Wei Tsang Ooi
NOMS
2008
IEEE
14 years 2 months ago
Monitoring scheduling for home gateways
— In simple and monolithic systems such as our current home gateways, monitoring is often overlooked: the home user can only reboot the gateway when there is a problem. In next-g...
Stéphane Frénot, Yvan Royon, Pierre ...
CRYPTO
2007
Springer
145views Cryptology» more  CRYPTO 2007»
14 years 2 months ago
Chernoff-Type Direct Product Theorems
Consider a challenge-response protocol where the probability of a correct response is at least α for a legitimate user and at most β < α for an attacker. One example is a CAP...
Russell Impagliazzo, Ragesh Jaiswal, Valentine Kab...
SEKE
2007
Springer
14 years 2 months ago
TRAP.NET: A Realization of Transparent Shaping in .NET
We define adaptability as the capacity of software in adjusting its behavior in response to changing conditions. To list just a few examples, adaptability is important in pervasiv...
Seyed Masoud Sadjadi, Fernando Trigoso