Sciweavers

554 search results - page 9 / 111
» A New Approach For Source Authentication Of Multicast Data
Sort
View
SIGMOD
2010
ACM
231views Database» more  SIGMOD 2010»
14 years 11 days ago
Automatically incorporating new sources in keyword search-based data integration
Scientific data offers some of the most interesting challenges in data integration today. Scientific fields evolve rapidly and accumulate masses of observational and experiment...
Partha Pratim Talukdar, Zachary G. Ives, Fernando ...
PASTE
1998
ACM
13 years 11 months ago
OPTVIEW: A New Approach for Examining Optimized Code
The task of mappingbetween source programs and machine code, once the code has been optimizedand transformed by a compiler is often di cult. Yet there are many instances, such as ...
Caroline Tice, Susan L. Graham
ICNP
1996
IEEE
13 years 11 months ago
A Comparison of Known Classes of Reliable Multicast Protocols
We analyze the maximum throughput that the known classes of reliable multicast protocols can attain. A new taxonomy of reliable multicast protocols is introduced based on the prem...
Brian Neil Levine, J. J. Garcia-Luna-Aceves
MASS
2010
150views Communications» more  MASS 2010»
13 years 5 months ago
A non-replication multicasting scheme in delay tolerant networks
Delay tolerant networks (DTNs) are a special type of wireless mobile networks which may lack continuous network connectivity. Multicast is an important routing function that suppor...
Jie Wu, Yunsheng Wang
ICPR
2008
IEEE
14 years 2 months ago
Using SIFT features in palmprint authentication
As a new branch of biometrics, palmprint authentication has attracted increasing amount of attention because palmprints are abundant of line features so that low resolution images...
Jiansheng Chen, Yiu Sang Moon