Sciweavers

1931 search results - page 160 / 387
» A BitTorrent Performance Evaluation Framework
Sort
View
122
Voted
ASIACRYPT
2004
Springer
15 years 9 months ago
How Far Can We Go Beyond Linear Cryptanalysis?
Abstract. Several generalizations of linear cryptanalysis have been proposed in the past, as well as very similar attacks in a statistical point of view. In this paper, we define ...
Thomas Baignères, Pascal Junod, Serge Vaude...
ACMICEC
2003
ACM
125views ECommerce» more  ACMICEC 2003»
15 years 8 months ago
A heuristic bidding strategy for multiple heterogeneous auctions
Online auctions are increasingly being used as a medium to procure goods and services. As the number of auction sites increases, however, consumers will inevitably want to track a...
Patricia Anthony, Nicholas R. Jennings
112
Voted
VLDB
2001
ACM
102views Database» more  VLDB 2001»
15 years 8 months ago
Form-Based Proxy Caching for Database-Backed Web Sites
We explore a new proxy-caching framework that exploits the query semantics of HTML forms. We identify a common class of form-based queries, and study two representative caching sc...
Qiong Luo, Jeffrey F. Naughton
147
Voted
IPPS
1999
IEEE
15 years 7 months ago
Reducing Parallel Overheads Through Dynamic Serialization
If parallelism can be successfully exploited in a program, significant reductions in execution time can be achieved. However, if sections of the code are dominated by parallel ove...
Michael Voss, Rudolf Eigenmann
MA
1999
Springer
89views Communications» more  MA 1999»
15 years 7 months ago
Mobile Agent Platforms for Web Databases: A Qualitative and Quantitative Assessment
In this paper we present practical experiences gathered from the employment of two popular Java-based mobile-agent platforms, IBM's Aglets and Mitsubishi's Concordia. We...
George Samaras, Marios D. Dikaiakos, Constantinos ...