Sciweavers

852 search results - page 112 / 171
» Small Active Counters
Sort
View
TCC
2007
Springer
93views Cryptology» more  TCC 2007»
14 years 4 months ago
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
Abstract. We construct an intrusion-resilient symmetric-key authenticated key exchange (AKE) protocol in the bounded retrieval model. The model employs a long shared private key to...
David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke L...
GLOBECOM
2006
IEEE
14 years 4 months ago
Two-Level Dynamic Bandwidth Allocation for a Space-to-Ground Relay Network
Abstract-We address issues related to efficiency, fairness, endto-end delay minimization and Quality-of-Service in order to enable a flexible access and dynamic mission operation c...
Hui Zeng, Michael H. Hadjitheodosiou, John S. Bara...
ICPR
2010
IEEE
14 years 3 months ago
Social Network Approach to Analysis of Soccer Game
Video understanding has been an active area of research, where many articles have been published on how to detect and track objects in videos, and how to analyze their trajectorie...
Kyoung-Jin Park, Alper Yilmaz
ACSAC
2005
IEEE
14 years 3 months ago
Detecting Intra-enterprise Scanning Worms based on Address Resolution
Signature-based schemes for detecting Internet worms often fail on zero-day worms, and their ability to rapidly react to new threats is typically limited by the requirement of som...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
ECRTS
2005
IEEE
14 years 3 months ago
Non-Preemptive Interrupt Scheduling for Safe Reuse of Legacy Drivers in Real-Time Systems
Low-level support of peripheral devices is one of the most demanding activities in a real-time operating system. In fact, the rapid development of new interface boards causes a tr...
Tullio Facchinetti, Giorgio C. Buttazzo, Mauro Mar...