Sciweavers

3477 search results - page 168 / 696
» From Tables to Frames
Sort
View
ICC
2009
IEEE
132views Communications» more  ICC 2009»
14 years 4 months ago
A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity
—A key agreement protocol is a protocol whereby two or more communicating parties can agree on a key or exchange information over an open communication network in such a way that...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
WEBDB
2009
Springer
130views Database» more  WEBDB 2009»
14 years 3 months ago
A Referential Integrity Browser for Distributed Databases
We demonstrate a program that can inspect a distributed relational database on the Internet to discover and quantify referential integrity issues for integration purposes. The pro...
Carlos Ordonez, Javier García-García...
ECSQARU
2009
Springer
14 years 3 months ago
Triangulation Heuristics for BN2O Networks
A BN2O network is a Bayesian network having the structure of a bipartite graph with all edges directed from one part (the top level) toward the other (the bottom level) and where a...
Petr Savický, Jirí Vomlel
AINA
2007
IEEE
14 years 3 months ago
MAC Address Translation for Enabling Scalable Virtual Private LAN Services
Virtual Private LAN Service (VPLS) has been considered as a feasible solution for transparent LAN service. By virtually locating all of the service intelligence in the provider ed...
Pi-Chung Wang, Chia-Tai Chan, Po-Yen Lin
IPPS
2007
IEEE
14 years 3 months ago
Leakage Energy Reduction in Value Predictors through Static Decay
As process technology advances toward deep submicron (below 90nm), static power becomes a new challenge to address for energy-efficient high performance processors, especially for...
Juan M. Cebrian, Juan L. Aragón, José...