Sciweavers

2203 search results - page 421 / 441
» Knowledge Integration
Sort
View
FC
2010
Springer
205views Cryptology» more  FC 2010»
14 years 1 months ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao
SP
2010
IEEE
158views Security Privacy» more  SP 2010»
14 years 1 months ago
Tamper Evident Microprocessors
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
Adam Waksman, Simha Sethumadhavan
EUROPAR
2009
Springer
14 years 1 months ago
Surfing Peer-to-Peer IPTV: Distributed Channel Switching
It is now common for IPTV systems attracting millions of users to be based on a peer-to-peer (P2P) architecture. In such systems, each channel is typically associated with one P2P ...
Anne-Marie Kermarrec, Erwan Le Merrer, Yaning Liu,...
CIKM
2004
Springer
14 years 1 months ago
Energy management schemes for memory-resident database systems
With the tremendous growth of system memories, memoryresident databases are increasingly becoming important in various domains. Newer memories provide a structured way of storing ...
Jayaprakash Pisharath, Alok N. Choudhary, Mahmut T...
CAISE
2006
Springer
14 years 1 months ago
Bridging the Gap between Data Warehouses and Organizations
Abstract. Data Warehouse (DWH) systems are used by decision makers for performance measurement and decision support. Currently the main focus of the DWH research field is not as mu...
Veronika Stefanov