Sciweavers

2722 search results - page 524 / 545
» Hastily formed networks
Sort
View
WPES
2006
ACM
14 years 1 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov
3DGIS
2006
Springer
14 years 1 months ago
Reconstruction of Complex Buildings using LIDAR and 2D Maps
The extraction of the building models from remote-sensed data is an important work in the geographic information systems. This investigation describes an approach to integrate LIDA...
Tee-Ann Teo, Jiann-Yeou Rau, Liang-Chien Chen, Jin...
HICSS
2005
IEEE
154views Biometrics» more  HICSS 2005»
14 years 1 months ago
Market Structure and the Predictability of Electricity System Line Flows: An Experimental Analysis
Robert Thomas has shown, using simulations of experimental results, that the power flow on any line in an electric network is linearly proportional to the total system load when t...
Nodir Adilov, Thomas Light, Richard E. Schuler, Wi...
INFOCOM
2005
IEEE
14 years 1 months ago
Fairness in MIMD congestion control algorithms
The Mulitplicative Increase Multiplicative Decrease (MIMD) congestion control algorithm in the form of Scalable TCP has been proposed for high speed networks. We study fairness amo...
Eitan Altman, Konstantin Avrachenkov, B. J. Prabhu
IPPS
2005
IEEE
14 years 1 months ago
On the Optimal Placement of Secure Data Objects over Internet
Secret sharing algorithms have been used for intrusion tolerance, which ensure the confidentiality, integrity and availability of critical information. However, dynamically changi...
Manghui Tu, Peng Li, Qingkai Ma, I-Ling Yen, Farok...