Sciweavers

2862 search results - page 543 / 573
» Bicriteria Network Design Problems
Sort
View
SACMAT
2010
ACM
13 years 5 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
TIFS
2010
186views more  TIFS 2010»
13 years 5 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
HUC
2010
Springer
13 years 5 months ago
A holistic multipurpose life-log framework
Life-log systems have a wide range of usages from memory augmentation to health monitoring. Recent advances in pervasive devices and sensor networks enable us to create tools that...
Reza Rawassizadeh
TVLSI
2010
13 years 2 months ago
A Novel Variation-Tolerant Keeper Architecture for High-Performance Low-Power Wide Fan-In Dynamic or Gates
Dynamic gates have been excellent choice in the design of high-performance modules in modern microprocessors. The only limitation of dynamic gates is their relatively low noise mar...
Hamed F. Dadgour, Kaustav Banerjee
ICDE
2002
IEEE
146views Database» more  ICDE 2002»
14 years 8 months ago
Data Mining Meets Performance Evaluation: Fast Algorithms for Modeling Bursty Traffic
Network, web, and disk I/O traffic are usually bursty, self-similar [9, 3, 5, 6] and therefore can not be modeled adequately with Poisson arrivals[9]. However, we do want to model...
Mengzhi Wang, Ngai Hang Chan, Spiros Papadimitriou...