Sciweavers

674 search results - page 51 / 135
» An Efficient Key Management Scheme for Pervasive Computing
Sort
View
CIDR
2009
140views Algorithms» more  CIDR 2009»
13 years 8 months ago
Energy Efficiency: The New Holy Grail of Data Management Systems Research
Energy costs are quickly rising in large-scale data centers and are soon projected to overtake the cost of hardware. As a result, data center operators have recently started turni...
Stavros Harizopoulos, Mehul A. Shah, Justin Meza, ...
ITIIS
2008
151views more  ITIIS 2008»
13 years 7 months ago
Bandwidth Management of WiMAX Systems and Performance Modeling
WiMAX has been introduced as a competitive alternative for metropolitan broadband wireless access technologies. It is connection oriented and it can provide very high data rates, ...
Yue Li, Jianhua He, Weixi Xing
CSREASAM
2009
13 years 8 months ago
A Tripartite Strong Designated Verifier Scheme Based On Threshold RSA Signatures
In this paper we propose a new designated verifier signature scheme based on the threshold signature scheme presented [8] by Ghodosi and Pieprzyk. The advantages of the new scheme ...
Jerome Dossogne, Olivier Markowitch
ACISP
2005
Springer
14 years 1 months ago
Group Signature Schemes with Membership Revocation for Large Groups
Group signature schemes with membership revocation have been intensively researched. However, signing and/or verification of some existing schemes have computational costs of O(R)...
Toru Nakanishi, Fumiaki Kubooka, Naoto Hamada, Nob...
ICC
2007
IEEE
162views Communications» more  ICC 2007»
14 years 2 months ago
Ontology-Based Reasoning for Supporting Context-Aware Services on Autonomic Networks
- Ontology engineering has been proposed as a formal mechanism for both reducing the complexity of managing the information needed in network management and autonomic systems and f...
Jaime Martín Serrano, Joan Serrat, John Str...