Sciweavers

849 search results - page 18 / 170
» Completely Non-malleable Schemes
Sort
View
NETWORKING
2007
13 years 9 months ago
Incorporating Protection Mechanisms in the Dynamic Multi-layer Routing Schemes
In the next generation backbone networks, IP/MPLS over optical networks, the ability to maintain an acceptable level of reliability has become crucial since a failure can result in...
Anna Urra, Eusebi Calle, José-Luis Marzo, P...
DAM
2006
102views more  DAM 2006»
13 years 7 months ago
Secret sharing schemes on access structures with intersection number equal to one
The characterization of ideal access structures and the search for bounds on the optimal information rate are two important problems in secret sharing. These problems are studied ...
Jaume Martí-Farré, Carles Padr&oacut...
CLUSTER
2006
IEEE
14 years 1 months ago
SLA-Based Coordinated Superscheduling Scheme for Computational Grids
The Service Level Agreement (SLA) based grid superscheduling approach promotes coordinated resource sharing. Superscheduling is facilitated between administratively and topologica...
Rajiv Ranjan, Aaron Harwood, Rajkumar Buyya
JCDL
2006
ACM
83views Education» more  JCDL 2006»
14 years 1 months ago
An experimental framework for comparative digital library evaluation: the logging scheme
Evaluation of digital libraries assesses their effectiveness, quality and overall impact. In this paper we present a novel, multi-level logging framework that will provide comple...
Claus-Peter Klas, Norbert Fuhr, Sascha Kriewel, Ha...
WOWMOM
2006
ACM
150views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks
Abstract— A sybil node impersonates other nodes by broadcasting messages with multiple node identifiers (ID). In contrast to existing solutions which are based on sharing encryp...
Murat Demirbas, Youngwhan Song