Sciweavers

158 search results - page 26 / 32
» Analysis of improved signcryption scheme with key privacy
Sort
View
ESORICS
2009
Springer
14 years 9 months ago
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, whe...
Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou
NETWORKING
2007
13 years 10 months ago
On-Line Predictive Load Shedding for Network Monitoring
Building robust network monitoring applications is hard given the unpredictable nature of network traffic. Complex analysis on streaming network data usually leads to overload situ...
Pere Barlet-Ros, Diego Amores-López, Gianlu...
EUSFLAT
2003
165views Fuzzy Logic» more  EUSFLAT 2003»
13 years 10 months ago
Genetic fuzzy systems to evolve coordination strategies in competitive distributed systems
This paper suggests an evolutionary approach to design coordination strategies, a key issue in distributed intelligent systems. We focus on competitive strategies in the form of f...
Igor Walter, Fernando A. C. Gomide
MONET
2006
139views more  MONET 2006»
13 years 8 months ago
Market Driven Dynamic Spectrum Allocation over Space and Time among Radio-Access Networks: DVB-T and B3G CDMA with Heterogeneous
The radio frequency spectrum is a naturally limited resource of extraordinary value, as the key to the provision of important communication and information services. Traditionally,...
Virgilio Rodriguez, Klaus Moessner, Rahim Tafazoll...
ACSAC
2007
IEEE
14 years 17 days ago
Efficient Detection of Delay-Constrained Relay Nodes
Relay nodes are a potential threat to networks since they are used in many malicious situations like stepping stone attacks, botnet communication, peer-to-peer streaming etc. Quic...
Baris Coskun, Nasir D. Memon