Sciweavers

8780 search results - page 1733 / 1756
» On the Feasibility of Consistent Computations
Sort
View
CN
2007
144views more  CN 2007»
13 years 9 months ago
SPP: An anti-phishing single password protocol
Most users have multiple accounts on the Internet where each account is protected by a password. To avoid the headache in remembering and managing a long list of different and un...
Mohamed G. Gouda, Alex X. Liu, Lok M. Leung, Moham...
INTERNET
2008
175views more  INTERNET 2008»
13 years 9 months ago
Mashing Up Search Services
through suitable abstractions and tools is a viable option for improving servicebased computations. T he past few years have witnessed end users' increasing involve ment in th...
Daniele Braga, Stefano Ceri, Florian Daniel, David...
CN
2007
111views more  CN 2007»
13 years 9 months ago
An auction mechanism for allocating the bandwidth of networks to their users
We present a mechanism for auctioning bandwidth on a network-wide basis to end users or ISPs that will utilize it for the same time period. This mechanism consists of a set of sim...
Manos Dramitinos, George D. Stamoulis, Costas Cour...
ITIIS
2008
151views more  ITIIS 2008»
13 years 9 months ago
Bandwidth Management of WiMAX Systems and Performance Modeling
WiMAX has been introduced as a competitive alternative for metropolitan broadband wireless access technologies. It is connection oriented and it can provide very high data rates, ...
Yue Li, Jianhua He, Weixi Xing
CONSTRAINTS
2007
112views more  CONSTRAINTS 2007»
13 years 9 months ago
Maxx: Test Pattern Optimisation with Local Search Over an Extended Logic
In the ECAD area, the Test Generation (TG) problem consists in finding an input vector test for some possible diagnosis (a set of faults) of a digital circuit. Such tests may have ...
Francisco Azevedo
« Prev « First page 1733 / 1756 Last » Next »