Sciweavers

9186 search results - page 1693 / 1838
» A Module System for Scheme
Sort
View
ENTCS
2006
123views more  ENTCS 2006»
13 years 10 months ago
Wrapping of Web Sources with restricted Query Interfaces by Query Tunneling
Information sources in the World Wide Web usually offer two different schemes to their users, an Interface Schema which the user can query and a Result Schema which the user can b...
Thomas Kabisch, Mattis Neiling
CCR
2007
115views more  CCR 2007»
13 years 10 months ago
Analysis of the SPV secure routing protocol: weaknesses and lessons
We analyze a secure routing protocol, Secure Path Vector (SPV), proposed in SIGCOMM 2004. SPV aims to provide authenticity for route announcements in the Border Gateway Protocol (...
Barath Raghavan, Saurabh Panjwani, Anton Mityagin
CGA
2007
13 years 10 months ago
Content-Based 3D Object Retrieval
3D objects are an important multimedia data type with many applications in domains such as Computer Aided Design, Simulation, Visualization, and Entertainment. Advancements in pro...
Benjamin Bustos, Daniel A. Keim, Dietmar Saupe, To...
IJBC
2006
93views more  IJBC 2006»
13 years 10 months ago
Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems
In recent years, a large amount of work on chaos-based cryptosystems have been published. However many of the proposed schemes fail to explain or do not possess a number of featur...
Gonzalo Álvarez, Shujun Li
CONCURRENCY
2007
60views more  CONCURRENCY 2007»
13 years 10 months ago
Relative autonomous accounting for peer-to-peer Grids
We here present and evaluate relative accounting, an autonomous accounting scheme that provides accurate results even when the parties (consumer and provider) do not trust each ot...
Robson Santos, Alisson Andrade, Walfredo Cirne, Fr...
« Prev « First page 1693 / 1838 Last » Next »