Sciweavers

617 search results - page 100 / 124
» On the design of hybrid peer-to-peer systems
Sort
View
AFRICACRYPT
2008
Springer
14 years 1 months ago
Cryptanalysis of the TRMS Signature Scheme of PKC'05
In this paper, we investigate the security of the Tractable Rationale Maps Signature (TRMS) signature scheme [9] proposed at PKC’05. To do so, we present a hybrid approach for so...
Luk Bettale, Jean-Charles Faugère, Ludovic ...
JCP
2008
115views more  JCP 2008»
13 years 7 months ago
Practical Chip-level Equalizers in HSDPA
High-speed downlink packet access (HSDPA) has been developed to upgrade the current WCDMA system in yerms of providing a higher data rate for mobile users. To ensure a downlink spe...
Minjae Park, Woonsik Lee, Minh-Viet Nguyen, Hwang ...
TPDS
2010
113views more  TPDS 2010»
13 years 2 months ago
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery
In the past, some research has been done on how to use proactive recovery to build intrusion-tolerant replicated systems that are resilient to any number of faults, as long as reco...
Paulo Sousa, Alysson Neves Bessani, Miguel Correia...
ATAL
2009
Springer
14 years 2 months ago
Analyzing the tradeoffs between breakup and cloning in the context of organizational self-design
Organizational Self-Design (OSD) has been proposed as an approach to constructing suitable organizations at runtime in which the agents are responsible for constructing their own ...
Sachin Kamboj
ECIR
2007
Springer
13 years 9 months ago
Searching Documents Based on Relevance and Type
This paper extends previous work on document retrieval and document type classification, addressing the problem of ‘typed search’. Specifically, given a query and a designated ...
Jun Xu, Yunbo Cao, Hang Li, Nick Craswell, Yalou H...