Sciweavers

424 search results - page 55 / 85
» Adaptive SSL: Design, Implementation and Overhead Analysis
Sort
View
138
Voted
MOBICOM
2006
ACM
15 years 9 months ago
On accurate measurement of link quality in multi-hop wireless mesh networks
This paper presents a highly efficient and accurate link-quality measurement framework, called EAR (Efficient and Accurate link-quality monitoR), for multi-hop wireless mesh net...
Kyu-Han Kim, Kang G. Shin
158
Voted
SAS
1994
Springer
136views Formal Methods» more  SAS 1994»
15 years 7 months ago
Constraint-Based Type Inference and Parametric Polymorphism
Constraint-based analysis is a technique for inferring implementation types. Traditionally it has been described using mathematical formalisms. We explain it in a different and mor...
Ole Agesen
117
Voted
VLDB
2004
ACM
113views Database» more  VLDB 2004»
15 years 9 months ago
Auditing Compliance with a Hippocratic Database
We introduce an auditing framework for determining whether a database system is adhering to its data disclosure policies. Users formulate audit expressions to specify the (sensiti...
Rakesh Agrawal, Roberto J. Bayardo Jr., Christos F...
146
Voted
JCDL
2009
ACM
115views Education» more  JCDL 2009»
15 years 10 months ago
Using timed-release cryptography to mitigate the preservation risk of embargo periods
Due to temporary access restrictions, embargoed data cannot be refreshed to unlimited parties during the embargo time interval. A solution to mitigate the risk of data loss has be...
Rabia Haq, Michael L. Nelson
112
Voted
COMCOM
2007
82views more  COMCOM 2007»
15 years 3 months ago
On application-level load balancing in FastReplica
— In the paper, we consider the problem of distributing large-size content to a fixed set of nodes. In contrast with the most existing end-system solutions to this problem, Fast...
Jangwon Lee, Gustavo de Veciana