Sciweavers

500 search results - page 67 / 100
» Modeling Interactions from Email Communication
Sort
View
P2P
2005
IEEE
14 years 3 months ago
Toward Overlay Network Symbiosis
Simultaneous overlay networks compete for network resources and disrupt each other. If they cooperate with each other, the collective performance can be improved and they can coex...
Naoki Wakamiya, Masayuki Murata
VAMOS
2010
Springer
13 years 11 months ago
Automating the Configuration of Multi Software Product Lines
The increased use of software product lines (SPLs) results in complex software systems in which products of multiple SPLs communicate and interact with each other. Such a system of...
Marko Rosenmüller, Norbert Siegmund
CRYPTO
2000
Springer
157views Cryptology» more  CRYPTO 2000»
14 years 2 months ago
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing
Private information retrieval (PIR) enables a user to retrieve a data item from a database, replicated among one or more servers, while hiding the identity of the retrieved item. ...
Amos Beimel, Yuval Ishai, Tal Malkin
ISORC
2000
IEEE
14 years 2 months ago
Hybrid Sequence Charts
We introduce Hybrid Sequence Charts (HySCs) as a visual description technique for communication in hybrid system models. To that end, we adapt a subset of the well-known MSC synta...
Radu Grosu, Ingolf Krüger, Thomas Stauner
INFOCOM
2010
IEEE
13 years 7 months ago
Predictive Blacklisting as an Implicit Recommendation System
A widely used defense practice against malicious traffic on the Internet is to maintain blacklists, i.e., lists of prolific attack sources that have generated malicious activity in...
Fabio Soldo, Anh Le, Athina Markopoulou