Sciweavers

6137 search results - page 988 / 1228
» Securing Collaborative Applications
Sort
View
116
Voted
INFOCOM
2006
IEEE
15 years 8 months ago
Network Protocol System Fingerprinting - A Formal Approach
— Network protocol system fingerprinting has been recognized as an important issue and a major threat to network security. Prevalent works rely largely on human experiences and i...
Guoqiang Shu, David Lee
97
Voted
INFOCOM
2006
IEEE
15 years 8 months ago
Overhead and Performance Study of the General Internet Signaling Transport (GIST) Protocol
— The General Internet Signaling Transport (GIST) protocol is currently being developed as the base protocol component in the IETF Next Steps In Signaling (NSIS) protocol stack t...
Xiaoming Fu, Henning Schulzrinne, Hannes Tschofeni...
112
Voted
ISCC
2006
IEEE
126views Communications» more  ISCC 2006»
15 years 8 months ago
A Novel QoS Framework for Medium-Sized MANETs Supporting Multipath Routing Protocols
Multipath routing protocols have proved to be able to enhance the performance of MANET in terms of reliability, load balancing, multimedia streaming, security, etc. However, deplo...
Carlos Miguel Tavares Calafate, Pietro Manzoni, Ma...
SKG
2006
IEEE
15 years 8 months ago
Top Ten Questions To Design A Successful Grid Portal
With the enhancement of Grid application, Grid portal provides a unique interface for end-users to access distributed resources and are used widely in Knowledge Grid, e-Science, e...
Xiao Dong Wang, Xiaobo Yang, Rob Allan
139
Voted
CRV
2005
IEEE
305views Robotics» more  CRV 2005»
15 years 8 months ago
3D Model-Assisted Face Recognition in Video
Face recognition in video has gained wide attention as a covert method for surveillance to enhance security in a variety of application domains (e.g., airports). A video contains ...
Unsang Park, Hong Chen, Anil K. Jain