Sciweavers

641 search results - page 88 / 129
» Implementation and use of the PLT scheme Web server
Sort
View
PODC
2003
ACM
14 years 1 months ago
Scalable public-key tracing and revoking
Traitor Tracing Schemes constitute a very useful tool against piracy in the context of digital content broadcast. In such multi-recipient encryption schemes, each decryption key is...
Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti...
ICCCN
2008
IEEE
14 years 2 months ago
Sentinel: Hardware-Accelerated Mitigation of Bot-Based DDoS Attacks
—Effective defenses against DDoS attacks that deplete resources at the network and transport layers have been deployed commercially. Therefore, DDoS attacks increasingly use norm...
Peter Djalaliev, Muhammad Jamshed, Nicholas Farnan...
MOBIHOC
2003
ACM
14 years 7 months ago
Energy-efficient caching strategies in ad hoc wireless networks
In this paper, we address the problem of energy-conscious cache placement in wireless ad hoc networks. We consider a network comprising a server with an interface to the wired net...
Pavan Nuggehalli, Vikram Srinivasan, Carla-Fabiana...
BMCBI
2008
95views more  BMCBI 2008»
13 years 7 months ago
PURE: A webserver for the prediction of domains in unassigned regions in proteins
Background: Protein domains are the structural and functional units of proteins. The ability to parse proteins into different domains is important for effective classification, un...
Chilamakuri C. S. Reddy, Khader Shameer, Bernard O...
SEMWEB
2009
Springer
14 years 8 days ago
A Weighted Approach to Partial Matching for Mobile Reasoning
Due to significant improvements in the capabilities of small devices such as PDAs and smart phones, these devices can not only consume but also provide Web Services. The dynamic n...
Luke Albert Steller, Shonali Krishnaswamy, Mohamed...