Sciweavers

4757 search results - page 912 / 952
» A Unique
Sort
View
142
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
A Systematic Approach for Evolving VLAN Designs
—Enterprise networks are large and complex, and their designs must be frequently altered to adapt to changing organizational needs. The process of redesigning and reconfiguring ...
Xin Sun, Yu-Wei Eric Sung, Sunil Krothapalli, Sanj...
JCS
2010
104views more  JCS 2010»
15 years 2 months ago
Finding the PKI needles in the Internet haystack
Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...
Massimiliano Pala, Sean W. Smith
TMC
2008
159views more  TMC 2008»
15 years 2 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
JDWM
2010
180views more  JDWM 2010»
15 years 2 months ago
Investigating the Properties of a Social Bookmarking and Tagging Network
Social networks and collaborative tagging systems are rapidly gaining popularity as a primary means for storing and sharing data among friends, family, colleagues, or perfect stra...
Ralitsa Angelova, Marek Lipczak, Evangelos E. Mili...
JNS
2010
98views more  JNS 2010»
15 years 2 months ago
Analysis of a General Family of Regularized Navier-Stokes and MHD Models
ABSTRACT. We consider a general family of regularized Navier-Stokes and Magnetohydrodynamics (MHD) models on n-dimensional smooth compact Riemannian manifolds with or without bound...
Michael Holst, Evelyn Lunasin, Gantumur Tsogtgerel