Sciweavers

897 search results - page 17 / 180
» Identity: How to name it, How to find it
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
Measuring Availability in the Domain Name System
Abstract--The domain name system (DNS) is critical to Internet functionality. The availability of a domain name refers to its ability to be resolved correctly. We develop a model f...
Casey T. Deccio, Jeff Sedayao, Krishna Kant, Prasa...
WISTP
2007
Springer
14 years 2 months ago
A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks
The network is becoming more and more versatile because of the variety of the computing resources and the communication technologies that have become available. The mobility of the...
Eve Atallah, Serge Chaumette
HUC
2007
Springer
14 years 2 months ago
Why It's Worth the Hassle: The Value of In-Situ Studies When Designing Ubicomp
How should Ubicomp technologies be evaluated? While lab studies are good at sensing aspects of human behavior and revealing usability problems, they are poor at capturing context o...
Yvonne Rogers, Kay Connelly, Lenore Tedesco, Willi...
DIM
2008
ACM
13 years 10 months ago
Minimal information disclosure with efficiently verifiable credentials
Public-key based certificates provide a standard way to prove one's identity, as attested by some certificate authority (CA). However, plain certificates provide a binary ide...
David Bauer, Douglas M. Blough, David Cash
SIGMETRICS
2008
ACM
118views Hardware» more  SIGMETRICS 2008»
13 years 8 months ago
Finding the optimal quantum size: Sensitivity analysis of the M/G/1 round-robin queue
We consider the round robin (RR) scheduling policy where the server processes each job in its buffer for at most a fixed quantum, q, in a round-robin fashion. The processor sharin...
Varun Gupta