Sciweavers

1272 search results - page 84 / 255
» Implementation of Bitmap Based Incognito and Performance Eva...
Sort
View
COMPSAC
2011
IEEE
12 years 9 months ago
Dynamic Request Management Algorithms for Web-Based Services in Cloud Computing
—Providers of Web-based services can take advantage of many convenient features of cloud computing infrastructures, but they still have to implement request management algorithms...
Riccardo Lancellotti, Mauro Andreolini, Claudia Ca...
EDOC
2000
IEEE
14 years 1 months ago
Wireless Java RMI
Due to its high protocol overhead, both in data traffic and in round-trips, Java RMI is poorly suited for communication over slow wireless links. However, its performance can be ...
Stefano Campadello, Oskari Koskimies, Kimmo E. E. ...
SIGMOD
2002
ACM
145views Database» more  SIGMOD 2002»
14 years 9 months ago
Continuously adaptive continuous queries over streams
We present a continuously adaptive, continuous query (CACQ) implementation based on the eddy query processing framework. We show that our design provides significant performance b...
Samuel Madden, Mehul A. Shah, Joseph M. Hellerstei...
KIVS
2009
Springer
14 years 3 months ago
Practical Rate-Based Congestion Control for Wireless Mesh Networks
We introduce an adaptive pacing scheme to overcome the drawbacks of TCP in wireless mesh networks with Internet connectivity. The pacing scheme is implemented at the wireless TCP s...
Sherif M. ElRakabawy, Christoph Lindemann
IJBC
2006
93views more  IJBC 2006»
13 years 9 months ago
Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems
In recent years, a large amount of work on chaos-based cryptosystems have been published. However many of the proposed schemes fail to explain or do not possess a number of featur...
Gonzalo Álvarez, Shujun Li