Sciweavers

3276 search results - page 586 / 656
» Data Management for Pervasive Computing
Sort
View
SIGCOMM
2010
ACM
13 years 9 months ago
Scalable flow-based networking with DIFANE
Ideally, enterprise administrators could specify fine-grain policies that drive how the underlying switches forward, drop, and measure traffic. However, existing techniques for fl...
Minlan Yu, Jennifer Rexford, Michael J. Freedman, ...
ANOR
2006
133views more  ANOR 2006»
13 years 9 months ago
Horizon and stages in applications of stochastic programming in finance
To solve a decision problem under uncertainty via stochastic programming means to choose or to build a suitable stochastic programming model taking into account the nature of the r...
Marida Bertocchi, Vittorio Moriggia, Jitka Dupacov...
IJNSEC
2006
143views more  IJNSEC 2006»
13 years 9 months ago
Password Authentication Schemes: Current Status and Key Issues
Password authentication is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. It is more frequently required in...
Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang
JAL
2008
89views more  JAL 2008»
13 years 9 months ago
Experimenting with parallelism for the instantiation of ASP programs
Abstract. In the last few years, the microprocessors technologies have been definitely moving to multi-core architectures, in order to improve performances as well as reduce power ...
Francesco Calimeri, Simona Perri, Francesco Ricca
CORR
2007
Springer
138views Education» more  CORR 2007»
13 years 9 months ago
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. U...
Sapon Tanachaiwiwat, Ahmed Helmy