Sciweavers

1063 search results - page 67 / 213
» Infrastructure Leasing Problems
Sort
View
ACISP
2010
Springer
13 years 10 months ago
Security Estimates for Quadratic Field Based Cryptosystems
Abstract. We describe implementations for solving the discrete logarithm problem in the class group of an imaginary quadratic field and in the infrastructure of a real quadratic fi...
Jean-François Biasse, Michael J. Jacobson, ...
IADIS
2003
13 years 10 months ago
Anti-Sniffing in Unbounded Networks
Along with the trend in networked computing environments towards largely unbounded network infrastructures, the traditional anti-sniffing issue meets a great challenge. This paper...
Xiu-guo Bao, Ming-zheng Hu, Xiao-chun Yun, Ri Ding
SIGCOMM
2010
ACM
13 years 9 months ago
Stochastic approximation algorithm for optimal throughput performance of wireless LANs
In this paper, we consider the problem of throughput maximization in an infrastructure based WLAN. We demonstrate that most of the proposed protocols though perform optimally for ...
Sundaresan Krishnan, Prasanna Chaporkar
IMDS
2006
389views more  IMDS 2006»
13 years 8 months ago
Success and failure of pure-play organizations: Webvan versus Peapod, a comparative analysis
Many businesses have failed in pure play markets, on-line grocery retailers or e-grocers among them. E-grocers face many problems which the traditional brick and mortar grocery st...
Stephen E. Lunce, Leslie M. Lunce, Yoko Kawai, Bal...
JWSR
2006
113views more  JWSR 2006»
13 years 8 months ago
Search Strategies for Automatic Web Service Composition
: We investigate architectural properties required for supporting automatic service composition. First, composable service architecture will be described, based on modeling Web ser...
Nikola Milanovic, Miroslaw Malek