Sciweavers

674 search results - page 80 / 135
» An Efficient Key Management Scheme for Pervasive Computing
Sort
View
SIGMOD
2005
ACM
103views Database» more  SIGMOD 2005»
14 years 7 months ago
Verifying Completeness of Relational Query Results in Data Publishing
In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the publisher may be untrusted or susceptible to attacks, it could produ...
HweeHwa Pang, Arpit Jain, Krithi Ramamritham, Kian...
INFORMATICALT
2006
77views more  INFORMATICALT 2006»
13 years 7 months ago
Parallel Numerical Algorithms for 3D Parabolic Problem with Nonlocal Boundary Condition
Three parallel algorithms for solving the 3D problem with nonlocal boundary condition are considered. The forward and backward Euler finite-difference schemes, and LOD scheme are t...
Raimondas Ciegis
INFOCOM
2007
IEEE
14 years 1 months ago
CR Switch: A Load-Balanced Switch with Contention and Reservation
—Load-balanced switches have received a great deal of attention recently as they are much more scalable than other existing switch architectures in the literature. However, as th...
Chao-Lin Yu, Cheng-Shang Chang, Duan-Shin Lee
DSOM
2008
Springer
13 years 9 months ago
Trust Management for Host-Based Collaborative Intrusion Detection
The accuracy of detecting an intrusion within a network of intrusion detection systems (IDSes) depends on the efficiency of collaboration between member IDSes. The security itself ...
Carol J. Fung, Olga Baysal, Jie Zhang, Issam Aib, ...
SIGMOD
2007
ACM
187views Database» more  SIGMOD 2007»
14 years 7 months ago
P-ring: an efficient and robust P2P range index structure
Data availability, collection and storage have increased dramatically in recent years, raising new technological and algorithmic challenges for database design and data management...
Adina Crainiceanu, Prakash Linga, Ashwin Machanava...