Sciweavers

1275 search results - page 45 / 255
» Are you having difficulty
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
NetTube: Exploring Social Networks for Peer-to-Peer Short Video Sharing
—The recent three years have witnessed an explosion of networked video sharing, represented by YouTube, as a new killer Internet application. Their sustainable development howeve...
Xu Cheng, Jiangchuan Liu
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 1 months ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen
ICSE
2001
IEEE-ACM
14 years 2 days ago
Effective Software Architecture Design: From Global Analysis to UML Descriptions
It is now generally accepted that separating software architecture into multiple views can help in reducing complexity and in making sound decisions about design trade-offs. Our f...
Robert L. Nord, Daniel J. Paulish, Dilip Soni, Chr...
ISSTA
1989
ACM
13 years 11 months ago
The Logic of Propagation in the Inscape Environment
The Inscape Environment research project addresses issues in supporting the development of large systems by large numbers of programmers. One aspect of this research is the ‘‘...
D. Perry
VLDB
1989
ACM
140views Database» more  VLDB 1989»
13 years 11 months ago
The Effect of Bucket Size Tuning in the Dynamic Hybrid GRACE Hash Join Method
In this paper, we show detailed analysis and performance evaluation of the Dynamic Hybrid GRACE Hash Join Method (DHGH Method) when the tuple distribution in buckets is unbalanced...
Masaru Kitsuregawa, Masaya Nakayama, Mikio Takagi