Sciweavers

7587 search results - page 1330 / 1518
» Network Analysis and Visualisation
Sort
View
WWW
2001
ACM
14 years 10 months ago
N for the price of 1: bundling web objects for more efficient content delivery
: Persistent connections address inefficiencies associated with multiple concurrent connections. They can improve response time when successfully used with pipelining to retrieve a...
Craig E. Wills, Mikhail Mikhailov, Hao Shang
STOC
2009
ACM
133views Algorithms» more  STOC 2009»
14 years 10 months ago
Near-perfect load balancing by randomized rounding
We consider and analyze a new algorithm for balancing indivisible loads on a distributed network with n processors. The aim is minimizing the discrepancy between the maximum and m...
Tobias Friedrich, Thomas Sauerwald
CCS
2009
ACM
14 years 10 months ago
D-algebra for composing access control policy decisions
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared to other algebrabased approaches aimed at policy composition, D-algebra is the...
Qun Ni, Elisa Bertino, Jorge Lobo
PKC
2009
Springer
129views Cryptology» more  PKC 2009»
14 years 9 months ago
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed unde...
Colin Boyd, Juan Manuel González Nieto, M. ...
CHI
2008
ACM
14 years 9 months ago
Pick me!: link selection in expertise search results
Expertise locator systems have been designed to help find experts within organizations. While there are many examples of these systems in the literature, there has not been any sy...
N. Sadat Shami, Kate Ehrlich, David R. Millen
« Prev « First page 1330 / 1518 Last » Next »