Sciweavers

20638 search results - page 4041 / 4128
» Network Computing
Sort
View
EUROCRYPT
2007
Springer
14 years 2 days ago
Batch Verification of Short Signatures
Abstract. With computer networks spreading into a variety of new environments, the need to authenticate and secure communication grows. Many of these new environments have particul...
Jan Camenisch, Susan Hohenberger, Michael Ø...
ATAL
2004
Springer
13 years 12 months ago
IDReAM: Intrusion Detection and Response Executed with Agent Mobility
This paper deals with a new approach to build a completely distributed and decentralized Intrusion Detection and Response System (IDRS) in computer networks. This approach is call...
Noria Foukia
LBM
2007
13 years 9 months ago
Decentralised Clinical Guidelines Modelling with Lightweight Coordination Calculus
Background: Clinical protocols and guidelines have been considered as a major means to ensure that cost-effective services are provided at the point of care. Recently, the comput...
Bo Hu, Srinandan Dasmahapatra, David Robertson, Pa...
CN
2007
95views more  CN 2007»
13 years 8 months ago
Quality-of-Service routing with path information aggregation
Most of the research proposals on Quality-of-Service (QoS) mechanisms have focused on providing guarantees in a single domain. Supporting QoS guarantees in the interdomain setting...
W.-Y. Tam, King-Shan Lui, Suleyman Uludag, Klara N...
ETT
2002
89views Education» more  ETT 2002»
13 years 8 months ago
Delay analysis of a probabilistic priority discipline
In computer networks, the Strict Priority (SP) discipline is perhaps the most common and simplest method to schedule packets from different classes of applications, each with diver...
Yuming Jiang, Chen-Khong Tham, Chi Chung Ko
« Prev « First page 4041 / 4128 Last » Next »