Sciweavers

5511 search results - page 884 / 1103
» Security for Network Places
Sort
View
WOTUG
2007
15 years 5 months ago
Integrating and Extending JCSP
This paper presents the extended and re-integrated JCSP library of CSP packages for Java. It integrates the differing advances made by Quickstone’s JCSP Network Edition and the ā...
Peter H. Welch, Neil Brown, James Moores, Kevin Ch...
ATAL
2010
Springer
15 years 5 months ago
A graph-theoretic approach to protect static and moving targets from adversaries
The static asset protection problem (SAP) in a road network is that of allocating resources to protect vertices, given any possible behavior by an adversary determined to attack t...
John P. Dickerson, Gerardo I. Simari, V. S. Subrah...
CIKM
2008
Springer
15 years 5 months ago
Cost-effective spam detection in p2p file-sharing systems
Spam is highly pervasive in P2P file-sharing systems and is difficult to detect automatically before actually downloading a file due to the insufficient and biased description of ...
Dongmei Jia
JMM2
2007
122views more  JMM2 2007»
15 years 4 months ago
Hierarchical Model-Based Activity Recognition With Automatic Low-Level State Discovery
Abstract— Activity recognition in video streams is increasingly important for both the computer vision and artificial intelligence communities. Activity recognition has many app...
Justin Muncaster, Yunqian Ma
WICOMM
2008
108views more  WICOMM 2008»
15 years 4 months ago
The multimedia broadcast/multicast service
Abstract-- This article provides an overview of the multimedia broadcast/multicast service (MBMS) for universal mobile telecommunications system (UMTS) networks. We first outline t...
George Xylomenos, Vasilis Vogkas, George Thanos