Sciweavers

254 search results - page 36 / 51
» Analysis of Privacy Loss in Distributed Constraint Optimizat...
Sort
View
EDOC
2009
IEEE
14 years 2 months ago
An End-to-End Approach for QoS-Aware Service Composition
Abstract—A simple and effective composition of software services into higher-level composite services is still a very challenging task. Especially in enterprise environments, Qua...
Florian Rosenberg, Predrag Celikovic, Anton Michlm...
GRID
2008
Springer
13 years 6 months ago
A Secure Grid Medical Data Manager Interfaced to the gLite Middleware
The medical community is producing and manipulating a tremendous volume of digital data for which computerized archiving, processing and analysis is needed. Grid infrastructures ar...
Johan Montagnat, Ákos Frohner, Daniel Jouve...
FOCS
2000
IEEE
13 years 11 months ago
Extracting Randomness via Repeated Condensing
Extractors (defined by Nisan and Zuckerman) are procedures that use a small number of truly random bits (called the seed) to extract many (almost) truly random bits from arbitrar...
Omer Reingold, Ronen Shaltiel, Avi Wigderson
LCN
2003
IEEE
14 years 19 days ago
Performance Analysis of IP Paging Protocol in IEEE 802.11 Networks
Recently, IEEE 802.11 wireless networks have been widely deployed in public areas for mobile Internet services. In the public wireless LAN systems, paging function is necessary to...
Sangheon Pack, Ved Kafle, Yanghee Choi
CCS
2011
ACM
12 years 7 months ago
MIDeA: a multi-parallel intrusion detection architecture
Network intrusion detection systems are faced with the challenge of identifying diverse attacks, in extremely high speed networks. For this reason, they must operate at multi-Giga...
Giorgos Vasiliadis, Michalis Polychronakis, Sotiri...