Sciweavers

12981 search results - page 2580 / 2597
» Model Checking and Abstraction
Sort
View
SCN
2010
Springer
187views Communications» more  SCN 2010»
13 years 7 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
TCOM
2010
109views more  TCOM 2010»
13 years 6 months ago
Results on Finite Wireless Networks on a Line
Abstract— Today, due to the vast amount of literature on largescale wireless networks, we have a fair understanding of the asymptotic behavior of such networks. However, in real ...
Ali Eslami, Mohammad Nekoui, Hossein Pishro-Nik
TGIS
2010
137views more  TGIS 2010»
13 years 6 months ago
Semantic Enablement for Spatial Data Infrastructures
Building on abstract reference models, the Open Geospatial Consortium (OGC) has established standards for storing, discovering, and processing geographical information. These stan...
Krzysztof Janowicz, Sven Schade, Arne Bröring...
TON
2010
93views more  TON 2010»
13 years 6 months ago
On suitability of Euclidean embedding for host-based network coordinate systems
Abstract—In this paper, we investigate the suitability of embedding Internet hosts into a Euclidean space given their pairwise distances (as measured by round-trip time). Using t...
Sanghwan Lee, Zhi-Li Zhang, Sambit Sahu, Debanjan ...
TON
2010
129views more  TON 2010»
13 years 6 months ago
QoS-based manycasting over optical burst-switched (OBS) networks
Abstract—Many distributed applications require a group of destinations to be coordinated with a single source. Multicasting is a communication paradigm to implement these distrib...
Balagangadhar G. Bathula, Vinod Vokkarane
« Prev « First page 2580 / 2597 Last » Next »