Sciweavers

141 search results - page 14 / 29
» Heap Assumptions on Demand
Sort
View
EOR
2006
68views more  EOR 2006»
13 years 9 months ago
Evaluation of time-varying availability in multi-echelon spare parts systems with passivation
The popular models for repairable item inventory, both in the literature as well as practical applications, assume that the demands for items are independent of the number of work...
Hoong Chuin Lau, Huawei Song, Chuen Teck See, Siew...
ICMCS
2009
IEEE
138views Multimedia» more  ICMCS 2009»
13 years 7 months ago
Compressed video stream watermarking for peer-to-peer based content distribution network
Peer-to-peer content distribution provides high network throughput with relatively low server cost and scales better than traditional content distribution networks with respect to...
Dekun Zou, Nicolas Prigent, Jeffrey A. Bloom
CCS
2009
ACM
14 years 10 months ago
Conditional proxy re-encryption secure against chosen-ciphertext attack
In a proxy re-encryption (PRE) scheme [4], a proxy, authorized by Alice, transforms messages encrypted under Alice's public key into encryptions under Bob's public key w...
Jian Weng, Robert H. Deng, Xuhua Ding, Cheng-Kang ...
ER
2003
Springer
144views Database» more  ER 2003»
14 years 3 months ago
A Framework for Business Rule Driven Web Service Composition
With web services emerging as a promising technology for supporting open and dynamic business processes, it is witnessed that standards for business process specification in the c...
Bart Orriëns, Jian Yang, Mike P. Papazoglou
CTRSA
2001
Springer
122views Cryptology» more  CTRSA 2001»
14 years 2 months ago
Password Authentication Using Multiple Servers
Safe long-term storage of user private keys is a problem in client/server systems. The problem can be addressed with a roaming system that retrieves keys on demand from remote cred...
David P. Jablon