Sciweavers

546 search results - page 64 / 110
» An Implementation Scheme of Relational Tables
Sort
View
JSAC
2008
121views more  JSAC 2008»
13 years 7 months ago
Network Coding Games with Unicast Flows
Abstract--To implement network coding, users need to coordinate and cooperate with respect to their strategies in terms of duplicating and transmitting side information across spec...
Jennifer Price, Tara Javidi
PODS
2005
ACM
119views Database» more  PODS 2005»
14 years 7 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
ISM
2006
IEEE
76views Multimedia» more  ISM 2006»
14 years 1 months ago
Peer-to-Peer Secure and Private Community Based Multimedia Communications
We have designed and implemented P2PWNC, a fully distributed, open to all, autonomous WLAN roaming scheme that can be used in a community to provide various multimedia communicati...
Pantelis A. Frangoudis, George C. Polyzos
IPSN
2007
Springer
14 years 1 months ago
Beacon location service: a location service for point-to-point routing in wireless sensor networks
In this paper we present Beacon Location Service (BLS): a location service for beacon-based routing algorithms like Beacon Vector Routing (BVR) [8] and S4 [19] . The role of a loc...
Jorge Ortiz, Chris R. Baker, Daekyeong Moon, Rodri...
USENIX
2004
13 years 9 months ago
Multihoming Performance Benefits: An Experimental Evaluation of Practical Enterprise Strategies
Multihoming is increasingly being employed by large enterprises and data centers as a mechanism to extract good performance from their provider connections. Today, multihomed end-...
Aditya Akella, Srinivasan Seshan, Anees Shaikh