Sciweavers

1102 search results - page 114 / 221
» Distributed Key Generation for the Internet
Sort
View
116
Voted
NSPW
2004
ACM
15 years 8 months ago
A collaborative approach to autonomic security protocols
This paper considers a new security protocol paradigm whereby principals negotiate and on-the-fly generate security protocols according to their needs. When principals wish to in...
Hongbin Zhou, Simon N. Foley
112
Voted
IAAI
2003
15 years 4 months ago
Transparent Grid Computing: A Knowledge-Based Approach
Grid computing provides key infrastructure for distributed problem solving in dynamic virtual organizations. It has been adopted by many scientific projects, and industrial intere...
Jim Blythe, Ewa Deelman, Yolanda Gil, Carl Kesselm...
125
Voted
CSDA
2008
80views more  CSDA 2008»
15 years 2 months ago
Variational Bayesian functional PCA
A Bayesian approach to analyze the modes of variation in a set of curves is suggested. It is based on a generative model thus allowing for noisy and sparse observations of curves....
Angelika van der Linde
126
Voted
JNW
2007
75views more  JNW 2007»
15 years 2 months ago
Improving and Analyzing LC-Trie Performance for IP-Address Lookup
— IP-address lookup is a key processing function of Internet routers. The lookup is challenging because it needs to perform a longest prefix match. In this paper, we present our...
Jing Fu, Olof Hagsand, Gunnar Karlsson
96
Voted
HOTNETS
2010
14 years 9 months ago
A case for information-bound referencing
Links and content references form the foundation of the way that users interact today. Unfortunately, the links used today (URLs) are fragile since they tightly specify a protocol...
Ashok Anand, Aditya Akella, Vyas Sekar, Srinivasan...