Sciweavers

2421 search results - page 146 / 485
» Message from the Co-Chairs
Sort
View
SIGOPS
1998
123views more  SIGOPS 1998»
13 years 9 months ago
A New Family of Authentication Protocols
Abstract. We present a related family of authentication and digital signature protocols based on symmetric cryptographic primitives which perform substantially better than previous...
Ross J. Anderson, Francesco Bergadano, Bruno Crisp...
VLDB
2002
ACM
166views Database» more  VLDB 2002»
13 years 9 months ago
COMA - A System for Flexible Combination of Schema Matching Approaches
Schema matching is the task of finding semantic correspondences between elements of two schemas. It is needed in many database applications, such as integration of web data source...
Hong Hai Do, Erhard Rahm
CORR
2010
Springer
129views Education» more  CORR 2010»
13 years 8 months ago
Understanding periodicity and regularity of nodal encounters in mobile networks: A spectral analysis
Abstract--Study on human mobility is gaining increasing attention from the research community with its multiple applications to use in mobile networks, particularly for the purpose...
Sungwook Moon, Ahmed Helmy
INFOCOM
2010
IEEE
13 years 7 months ago
Channel-based Unidirectional Stream Protocol (CUSP)
—This paper presents a novel transport protocol, CUSP, specifically designed with complex and dynamic network applications in mind. Peer-to-peer applications benefit in particu...
Wesley W. Terpstra, Christof Leng, Max Lehn, Aleja...
SIGMETRICS
2010
ACM
180views Hardware» more  SIGMETRICS 2010»
13 years 7 months ago
Route oracle: where have all the packets gone?
Many network-management problems in large backbone networks need the answer to a seemingly simple question: where does a given IP packet, entering the network at a particular plac...
Yaping Zhu, Jennifer Rexford, Subhabrata Sen, Aman...