Sciweavers

338 search results - page 22 / 68
» Operational Models for Reputation Servers
Sort
View
WINET
2010
121views more  WINET 2010»
13 years 6 months ago
Transmission algorithm for video streaming over cellular networks
2.5G and 3G cellular networks are becoming more and more widespread. Therefore, the need for value added services is increasing rapidly. One of the key services that operators see...
Y. Falik, A. Averbuch, U. Yechiali
TES
2001
Springer
13 years 12 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
DBSEC
2006
134views Database» more  DBSEC 2006»
13 years 9 months ago
Aggregation Queries in the Database-As-a-Service Model
In the Database-As-a-Service (DAS) model, clients store their database contents at servers belonging to potentially untrusted service providers. To maintain data confidentiality, ...
Einar Mykletun, Gene Tsudik
ASIACRYPT
2010
Springer
13 years 5 months ago
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
Private Set Intersection (PSI) protocols allow one party ("client") to compute an intersection of its input set with that of another party ("server"), such tha...
Emiliano De Cristofaro, Jihye Kim, Gene Tsudik
GCC
2005
Springer
14 years 1 months ago
The Architecture and Implementation of Resource Space Model System
Resource Space Model (RSM) is a semantic model to manage and share heterogeneous resources on the Internet. This paper focuses on the general architecture, physical implementation ...
Peng Shi, Yunpeng Xing, Erlin Yao, Zhen Wang, Kehu...