Sciweavers

3581 search results - page 638 / 717
» Modeling the Internet
Sort
View
CAISE
2000
Springer
14 years 2 months ago
CHAOS: An Active Security Mediation System
With the emergence of the Internet, collaborative computing has become more feasible than ever. Organizations can share valuable information among each other. However, certain user...
David Liu, Kincho H. Law, Gio Wiederhold
MOBICOM
1999
ACM
14 years 2 months ago
Next Century Challenges: Data-Centric Networking for Invisible Computing
Computing and telecommunications are maturing, and the next century promises a shift away from technology-driven general-purpose devices. Instead, we will focus on the needs of co...
Mike Esler, Jeffrey Hightower, Thomas E. Anderson,...
MOBICOM
1999
ACM
14 years 2 months ago
Optimizing the End-to-End Performance of Reliable Flows Over Wireless Links
We present the results of a performance evaluation of link layer error recovery over wireless links. Our analysis is based upon a case study of the circuit-switched data service i...
Reiner Ludwig, Almudena Konrad, Anthony D. Joseph
ISADS
1999
IEEE
14 years 2 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
ICMCS
1998
IEEE
86views Multimedia» more  ICMCS 1998»
14 years 2 months ago
Virtual Recovery of Excavated Archaeological Finds
This work aims at a virtual recovery of excavated archaeological finds in cyberspace for ancient relic preservation, archaeology research, and multimedia material generation. Many...
Jiang Yu Zheng, Zhong Li Zhang, Norihiro Abe