Sciweavers

4922 search results - page 904 / 985
» Internet time out
Sort
View
CONEXT
2005
ACM
13 years 10 months ago
Hybrid reliable multicast with TCP-XM
In recent years, much work has been done on attempting to scale multicast data transmission to hundreds or thousands of receivers. There are, however, many situations where an app...
Karl Jeacle, Jon Crowcroft, Marinho P. Barcellos, ...
COMSWARE
2008
IEEE
13 years 10 months ago
Extracting dense communities from telecom call graphs
Social networks refer to structures made of nodes that represent people or other entities embedded in a social context, and whose edges represent interaction between entities. Typi...
Vinayaka Pandit, Natwar Modani, Sougata Mukherjea,...
CRYPTO
2008
Springer
92views Cryptology» more  CRYPTO 2008»
13 years 10 months ago
Compression from Collisions, or Why CRHF Combiners Have a Long Output
A black-box combiner for collision resistant hash functions (CRHF) is a construction which given black-box access to two hash functions is collision resistant if at least one of th...
Krzysztof Pietrzak
ER
2008
Springer
123views Database» more  ER 2008»
13 years 10 months ago
Modeling and Querying E-Commerce Data in Hybrid Relational-XML DBMSs
Abstract. Data in many industrial application systems are often neither completely structured nor unstructured. Consequently semi-structured data models such as XML have become pop...
Lipyeow Lim, Haixun Wang, Min Wang
ESORICS
2008
Springer
13 years 10 months ago
Remote Integrity Check with Dishonest Storage Server
We are interested in this problem: a verifier, with a small and reliable storage, wants to periodically check whether a remote server is keeping a large file x. A dishonest server,...
Ee-Chien Chang, Jia Xu