Sciweavers

347 search results - page 12 / 70
» On private computation in incomplete networks
Sort
View
WWW
2010
ACM
14 years 2 months ago
Measurement-calibrated graph models for social network experiments
Access to realistic, complex graph datasets is critical to research on social networking systems and applications. Simulations on graph data provide critical evaluation of new sys...
Alessandra Sala, Lili Cao, Christo Wilson, Robert ...
CCGRID
2008
IEEE
13 years 9 months ago
High Performance Relay Mechanism for MPI Communication Libraries Run on Multiple Private IP Address Clusters
We have been developing a Grid-enabled MPI communication library called GridMPI, which is designed to run on multiple clusters connected to a wide-area network. Some of these clust...
Ryousei Takano, Motohiko Matsuda, Tomohiro Kudoh, ...
PERCOM
2009
ACM
14 years 2 months ago
Randomizing RFID Private Authentication
—Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in largescale...
Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, ...
CORR
2011
Springer
181views Education» more  CORR 2011»
13 years 2 months ago
Contract-Based Cooperative Spectrum Sharing
—Providing proper economic incentives is essential for the success of dynamic spectrum sharing. Cooperative spectrum sharing is one effective way to achieve this goal. In coopera...
Lingjie Duan, Lin Gao, Jianwei Huang
POLICY
2007
Springer
14 years 1 months ago
Call Management Policy Specification for the Asterisk Telephone Private Branch Exchange
A VoIP PBX supports flexible call handling functionality for selective forwarding, cost based outward call routing, recording calls etc. Both users and administrators need a flexi...
George Konstantoulakis, Morris Sloman