Sciweavers

488 search results - page 35 / 98
» Policy-Based Cryptography and Applications
Sort
View
ICDE
2006
IEEE
201views Database» more  ICDE 2006»
14 years 3 months ago
Content and Context Aware Networking Using Semantic Tagging
Today’s model of networking primarily concentrates intelligence at the end hosts with the network itself offering a simple“best-effort”,“data agnostic” communication med...
Sethuram Balaji Kodeswaran, Anupam Joshi
MDAI
2005
Springer
14 years 3 months ago
Cryptosystems Based on Elliptic Curve Pairing
The purpose of this paper is to introduce pairing over elliptic curve and apply it to ID based key agreement schemes and privacy preserving key agreement schemes. The key words her...
Eiji Okamoto, Takeshi Okamoto
CSCW
1994
ACM
14 years 1 months ago
A Flexible Object Merging Framework
The need to merge different versions of an object toa common state arises in collaborative computing due to several reasons including optimistic concurrency control, asynchronous ...
Jonathan P. Munson, Prasun Dewan
ISF
2002
71views more  ISF 2002»
13 years 9 months ago
Network Quality of Service for the Enterprise: A Broad Overview
One of the biggest challenges facing the Internet today is to scale to an infrastructure that can provide quality-of-service (QoS) to a wide variety of applications and traffic typ...
Stephanie Wood, Samir Chatterjee
ICUMT
2009
13 years 7 months ago
Experimental study on neighbor selection policy for Phoenix Network Coordinate system
Network Coordinate (NC) which provides efficient distance prediction with scalable measurements, brings benefits to various network applications. Phoenix Network Coordinate system ...
Gang Wang, Shining Wu, Guodong Wang, Beixing Deng,...