Sciweavers

1653 search results - page 219 / 331
» Timed analysis of security protocols
Sort
View
SASN
2006
ACM
14 years 4 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
IPPS
2006
IEEE
14 years 4 months ago
An adaptive dynamic grid-based approach to data distribution management
a This paper presents a novel Adaptive Dynamic Gridbased Data Distribution Management (DDM) scheme, which we refer to as ADGB. The main objective of our protocol is to optimize DDM...
Azzedine Boukerche, YunFeng Gu, Regina Borges de A...
ISCC
1999
IEEE
111views Communications» more  ISCC 1999»
14 years 2 months ago
Towards TCP-Friendly Adaptive Multimedia Applications Based on RTP
For multimedia senders to benefit the most of dynamically changing availability of network resources they need to adjust their transmission behavior in accordance with the network...
Dorgham Sisalem, Adam Wolisz
HPDC
1996
IEEE
14 years 2 months ago
Collecting and Modeling the Join/Leave Behavior of Multicast Group Members in the MBone
One purpose of the MBone is to study the performance of multicast and real-time protocols in global conferencing applications. Part of this evaluation is dependent on understandin...
Kevin C. Almeroth, Mostafa H. Ammar
ICPR
2006
IEEE
14 years 11 months ago
GMM-based SVM for face recognition
A new face recognition algorithm is presented. It supposes that a video sequence of a person is available both at enrollment and test time. During enrollment, a client Gaussian Mi...
Gérard Chollet, Hervé Bredin, Najim ...