Sciweavers

948 search results - page 154 / 190
» What can we achieve by arbitrary announcements
Sort
View
GIS
2009
ACM
14 years 9 months ago
Efficient and Secure Distribution of Massive Geo-Spatial Data
Modern geographic databases can contain a large volume of data that need to be distributed to subscribed customers. The data can be modeled as a cube, where typical dimensions inc...
Hao Yuan, Mikhail J. Atallah
WACV
2008
IEEE
14 years 3 months ago
Localization and Segmentation of A 2D High Capacity Color Barcode
A 2D color barcode can hold much more information than a binary barcode. Barcodes are often intended for consumer use, such as, a consumer can take an image with her cellphone cam...
Devi Parikh, Gavin Jancke
CCS
2007
ACM
14 years 3 months ago
Robust group key agreement using short broadcasts
A group key agreement protocol (GKA) allows a set of players to establish a shared secret key which can be used to secure a subsequent communication. Several efficient constantrou...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
CCS
2009
ACM
14 years 3 months ago
Secure in-VM monitoring using hardware virtualization
Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel. Current approaches use virtualization to gain hi...
Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea ...
DIALM
2003
ACM
113views Algorithms» more  DIALM 2003»
14 years 2 months ago
Multicast time maximization in energy constrained wireless networks
We consider the problem of maximizing the lifetime of a given multicast connection in a wireless network of energyconstrained (e.g. battery-operated) nodes, by choosing ideal tran...
Patrik Floréen, Petteri Kaski, Jukka Kohone...