Sciweavers

1317 search results - page 247 / 264
» A New Design for a Practical Secure Cookies System
Sort
View
SIGMOD
2008
ACM
182views Database» more  SIGMOD 2008»
14 years 8 months ago
Multi-tenant databases for software as a service: schema-mapping techniques
In the implementation of hosted business services, multiple tenants are often consolidated into the same database to reduce total cost of ownership. Common practice is to map mult...
Stefan Aulbach, Torsten Grust, Dean Jacobs, Alfons...
MOBICOM
2006
ACM
14 years 2 months ago
Robust rate adaptation for 802.11 wireless networks
Rate adaptation is a mechanism unspecified by the 802.11 standards, yet critical to the system performance by exploiting the multi-rate capability at the physical layer. In this ...
Starsky H. Y. Wong, Songwu Lu, Hao Yang, Vaduvur B...
CONEXT
2009
ACM
13 years 9 months ago
Virtually eliminating router bugs
Software bugs in routers lead to network outages, security vulnerabilities, and other unexpected behavior. Rather than simply crashing the router, bugs can violate protocol semant...
Eric Keller, Minlan Yu, Matthew Caesar, Jennifer R...
SAC
2010
ACM
14 years 3 months ago
Asynchronous Byzantine consensus with 2f+1 processes
Byzantine consensus in asynchronous message-passing systems has been shown to require at least 3f + 1 processes to be solvable in several system models (e.g., with failure detecto...
Miguel Correia, Giuliana Santos Veronese, Lau Cheu...
VTC
2006
IEEE
154views Communications» more  VTC 2006»
14 years 2 months ago
Adaptive Modulation and Coding for Bit Interleaved Coded Multiple Beamforming
— Bit interleaved coded multiple beamforming (BICMB) was previously designed to achieve full spatial multiplexing of min(N, M) and full spatial diversity of NM for N transmit and...
Ersin Sengul, Enis Akay, Ender Ayanoglu