Sciweavers

10159 search results - page 1874 / 2032
» System Design Validation Using Formal Models
Sort
View
P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 2 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
CEEMAS
2007
Springer
14 years 2 months ago
Collaborative Attack Detection in High-Speed Networks
We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the net...
Martin Rehák, Michal Pechoucek, Pavel Celed...
DOCENG
2004
ACM
14 years 1 months ago
Behavioral reactivity and real time programming in XML: functional programming meets SMIL animation
XML and its associated languages are emerging as powerful authoring tools for multimedia and hypermedia web content. Furthermore, intelligent presentation generation engines have ...
Peter R. King, Patrick Schmitz, Simon J. Thompson
ICMI
2004
Springer
281views Biometrics» more  ICMI 2004»
14 years 1 months ago
Articulatory features for robust visual speech recognition
Visual information has been shown to improve the performance of speech recognition systems in noisy acoustic environments. However, most audio-visual speech recognizers rely on a ...
Kate Saenko, Trevor Darrell, James R. Glass
HICSS
1996
IEEE
165views Biometrics» more  HICSS 1996»
14 years 14 days ago
Advanced Distributed Simulation through the Aggregate Level Simulation Protocol
The venerable problem solving technique of simulation finds itself inthe midstof a revolution. Where once it was regarded as a "technique of last resort" for systems ana...
Richard M. Weatherly, Annette L. Wilson, Bradford ...
« Prev « First page 1874 / 2032 Last » Next »