Sciweavers

1847 search results - page 278 / 370
» Computational Science Simulations Based on Web Services
Sort
View
137
Voted
FOCS
2010
IEEE
15 years 1 months ago
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of s...
Ran Canetti, Huijia Lin, Rafael Pass
84
Voted
WCNC
2010
IEEE
15 years 1 months ago
Applying Spring-Relaxation Technique in Cellular Network Localization
—This paper presents a simple solution suitable for the mandatory localization function for E-911 services specified by FCC. Our solution introduces zero-length spring technique...
Qing Zhang, Chuan Heng Foh, Boon-Chong Seet, Alvis...
161
Voted
WWW
2010
ACM
15 years 10 months ago
Object views: fine-grained sharing in browsers
Browsers do not currently support the secure sharing of JavaScript objects between principals. We present this problem as the need for object views, which are consistent and contr...
Leo A. Meyerovich, Adrienne Porter Felt, Mark S. M...
127
Voted
GLOBECOM
2009
IEEE
15 years 1 months ago
Performance Modeling for Heterogeneous Wireless Networks with Multiservice Overflow Traffic
Performance modeling is important for the purpose of developing efficient dimensioning tools for large complicated networks. But it is difficult to achieve in heterogeneous wireles...
Qian Huang, King-Tim Ko, Villy Bæk Iversen
112
Voted
INFOCOM
2002
IEEE
15 years 8 months ago
Fair Scheduling and Buffer Management in Internet Routers
Abstract—Input buffered switch architecture has become attractive for implementing high performance routers and expanding use of the Internet sees an increasing need for quality ...
Nan Ni, Laxmi N. Bhuyan