Sciweavers

5647 search results - page 1103 / 1130
» A word from the editor
Sort
View
JOC
2000
181views more  JOC 2000»
13 years 7 months ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern
JODL
2000
123views more  JODL 2000»
13 years 7 months ago
On Z39.50 wrapping and description logics
Z39.50 is a client/server protocol widely used in digital libraries and museums for searching and retrieving information spread over a number of heterogeneous sources. To overcome ...
Yannis Velegrakis, Vassilis Christophides, Panos C...
MMS
2000
13 years 7 months ago
Video Placement and Configuration of Distributed Video Servers on Cable TV Networks
A large-scale, distributed video-on-demand (VOD) system allows geographically dispersed residential and business users to access video services, such as movies and other multimedia...
Constantinos Vassilakis, Michael Paterakis, Peter ...
MMS
2000
13 years 7 months ago
SMDP: Minimizing Buffer Requirements for Continuous Media Servers
Excessive buffer requirement to handle continuous-media playbacks is an impediment to costeffective provisioning for on-line video retrieval. Given the skewed distribution of video...
Youjip Won, Jaideep Srivastava
SCP
2000
119views more  SCP 2000»
13 years 7 months ago
Automated compositional Markov chain generation for a plain-old telephone system
Obtaining performance models, like Markov chains and queueing networks, for systems of significant complexity and magnitude is a difficult task that is usually tackled using human...
Holger Hermanns, Joost-Pieter Katoen
« Prev « First page 1103 / 1130 Last » Next »