Sciweavers

1415 search results - page 233 / 283
» Verified systems by composition from verified components
Sort
View
CCS
2007
ACM
14 years 1 months ago
Split-ballot voting: everlasting privacy with distributed trust
In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every...
Tal Moran, Moni Naor
ISVC
2007
Springer
14 years 1 months ago
Blur in Human Vision and Increased Visual Realism in Virtual Environments
Abstract. A challenge for virtual reality (VR) applications is to increase the realism of an observer’s visual experience. For this purpose the variation of the blur an observer ...
Michael S. Bittermann, I. Sevil Sariyildiz, Ö...
MSN
2007
Springer
192views Sensor Networks» more  MSN 2007»
14 years 1 months ago
Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks
We have developed a self-healing key distribution scheme for secure multicast group communications for wireless sensor network environment. We present a strategy for securely distr...
Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ash...
E2EMON
2006
IEEE
14 years 1 months ago
Implementation and evaluation of an inline network measurement algorithm and its application to TCP-based service
Abstract— In our previous studies, we proposed ImTCP, an inline network measurement technique that can obtain available bandwidth information of the network path between sender a...
Tomoaki Tsugawa, Go Hasegawa, Masayuki Murata
IEEESCC
2006
IEEE
14 years 1 months ago
Ontology Reconciliation for Service-Oriented Computing
Service-oriented computing (SOC) is viewed as the computing paradigm of the near future, allowing for the dynamic interaction of services provided by distributed business partners...
Jingshan Huang, Jiangbo Dang, Michael N. Huhns