Sciweavers

548 search results - page 46 / 110
» Secure peer sampling
Sort
View
DGCI
2006
Springer
14 years 1 months ago
Topologically Correct Image Segmentation Using Alpha Shapes
Abstract. Existing theories on shape digitization impose strong constraints on feasible shapes and require error-free measurements. We use Delaunay triangulation and -shapes to pro...
Peer Stelldinger, Ullrich Köthe, Hans Meine
CORR
2011
Springer
174views Education» more  CORR 2011»
13 years 4 months ago
Hide-and-Seek with Directional Sensing
: We consider a game played between a hider, who hides a static object in one of several possible positions in a bounded planar region, and a searcher who wishes to reach the objec...
Alessandro Borri, Shaunak Dattaprasad Bopardikar, ...
ICC
2007
IEEE
165views Communications» more  ICC 2007»
14 years 4 months ago
Cryptographically Transparent Session Initiation Protocol (SIP) Proxies
—Proxies provide important rendezvous service in the Session Initiation Protocol (SIP), but it comes at a cost to privacy. A SIP proxy is privy to all of the signaling exchanged ...
Vijay K. Gurbani, Dean Willis, Francois Audet
IEEEARES
2006
IEEE
14 years 4 months ago
Censorship-Resistant and Anonymous P2P Filesharing
We present a P2P filesharing system that allows redundant storage of shared files in a way that no participating server ever stores data that could compromise its operator. Inst...
Regine Endsuleit, Thilo Mie
P2P
2006
IEEE
119views Communications» more  P2P 2006»
14 years 3 months ago
Defense against Intrusion in a Live Streaming Multicast System
Application-level multicast systems are vulnerable to attacks that impede nodes from receiving desired data. Live streaming protocols are especially susceptible to packet loss ind...
Maya Haridasan, Robbert van Renesse