Sciweavers

6598 search results - page 1265 / 1320
» Graph Theory with Applications
Sort
View
NDSS
2008
IEEE
15 years 10 months ago
Usable PIR
In [22] we showed that existing single-server computational private information retrieval (PIR) protocols for the purpose of preserving client access patterns leakage are orders o...
Peter Williams, Radu Sion
NDSS
2008
IEEE
15 years 10 months ago
Limits of Learning-based Signature Generation with Adversaries
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...
Shobha Venkataraman, Avrim Blum, Dawn Song
VTC
2008
IEEE
141views Communications» more  VTC 2008»
15 years 10 months ago
Mobile WiMAX: Performance Analysis and Comparison with Experimental Results
— The demand for broadband mobile services continues to grow. Conventional high-speed broadband solutions are based on wired-access technologies such as digital subscriber line (...
Mai Tran, George Zaggoulos, Andrew R. Nix, Angela ...
GRC
2007
IEEE
15 years 10 months ago
Towards Mobile Internet: Location Privacy Threats and Granular Computation Challenges
The bulk of contents out on the Internet continue to grow at an astounding pace. As computing and communications become ubiquitous, we are entering the Mobile Internet Computing e...
Ling Liu
ICC
2007
IEEE
198views Communications» more  ICC 2007»
15 years 10 months ago
On Control Plane for Service Provisioning in Light-trail WDM Optical Ring Networks
: A light-trail is a generalized lightpath that enables multiple nodes to statistically share an optical communication path (wavelength bus). A light-trail is different from a ligh...
Ashwin Gumaste, Janak Chandarana, Paresh Bafna, Na...
« Prev « First page 1265 / 1320 Last » Next »