Sciweavers

91 search results - page 12 / 19
» Heuristic Evaluation of Groupware Based on the Mechanics of ...
Sort
View
AIMS
2009
Springer
14 years 1 months ago
Evaluation of Sybil Attacks Protection Schemes in KAD
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Thibault Cholez, Isabelle Chrisment, Olivier Festo...
DEXA
2003
Springer
146views Database» more  DEXA 2003»
14 years 1 months ago
An Access Time Cost Model for Spatial Range Queries on Broadcast Geographical Data over Air
Wireless data broadcasting is well known for its excellent scalability. Most geographical data, such as weather and traffic, is public information and has a large number of potenti...
Jianting Zhang, Le Gruenwald
JPDC
2006
156views more  JPDC 2006»
13 years 8 months ago
Grid harvest service: A performance system of grid computing
Conventional performance evaluation mechanisms focus on dedicated systems. Grid computing infrastructure, on the other hand, is a shared collaborative environment constructed on v...
Ming Wu, Xian-He Sun
ISI
2006
Springer
13 years 8 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
GLOBECOM
2006
IEEE
14 years 2 months ago
On the Impact of Clear Channel Assessment on MAC Performance
— Clear Channel Assessment (CCA) is an essential ingredient in wireless networks employing channel sensing as part of their medium access mechanism. While CCA itself is implement...
Iyappan Ramachandran, Sumit Roy