Sciweavers

5409 search results - page 1054 / 1082
» A performance study of client-broker-server systems
Sort
View
CIKM
2009
Springer
14 years 3 months ago
Structure-aware indexing for keyword search in databases
Most of existing methods of keyword search over relational databases find the Steiner trees composed of relevant tuples as the answers. They identify the Steiner trees by discove...
Guoliang Li, Jianhua Feng, Jianyong Wang
CLOUDCOM
2009
Springer
14 years 3 months ago
Cloudbus Toolkit for Market-Oriented Cloud Computing
This keynote paper: (1) presents the 21st century vision of computing and identifies various IT paradigms promising to deliver computing as a utility; (2) defines the architecture ...
Rajkumar Buyya, Suraj Pandey, Christian Vecchiola
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
14 years 3 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
GECCO
2009
Springer
132views Optimization» more  GECCO 2009»
14 years 3 months ago
Bringing evolutionary computation to industrial applications with guide
Evolutionary Computation is an exciting research field with the power to assist researchers in the task of solving hard optimization problems (i.e., problems where the exploitabl...
Luís Da Costa, Marc Schoenauer
NOSSDAV
2009
Springer
14 years 3 months ago
Web 2.0 traffic measurement: analysis on online map applications
In recent years, web based online map applications have been getting more and more popular, such as Google Maps, Yahoo Maps. Many new Web 2.0 techniques such as mash-up and AJAX w...
Song Lin, Zhiguo Gao, Ke Xu
« Prev « First page 1054 / 1082 Last » Next »