Sciweavers

466 search results - page 69 / 94
» Practical declarative network management
Sort
View
ASIACRYPT
2004
Springer
14 years 1 months ago
Constant-Round Authenticated Group Key Exchange for Dynamic Groups
Abstract. An authenticated group key exchange (AGKE) scheme allows a group of users in a public network to share a session key which may later be used to achieve desirable cryptogr...
Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee
MOBIHOC
2010
ACM
13 years 5 months ago
Identifying the missing tags in a large RFID system
Comparing with the classical barcode system, RFID extends the operational distance from inches to a number of feet (passive RFID tags) or even hundreds of feet (active RFID tags)....
Tao Li, Shigang Chen, Yibei Ling
ICSE
2004
IEEE-ACM
14 years 7 months ago
Making Resource Decisions for Software Projects
Software metrics should support managerial decision making in software projects. We explain how traditional metrics approaches, such as regression-based models for cost estimation...
Norman E. Fenton, William Marsh, Martin Neil, Patr...
COCOA
2009
Springer
14 years 2 months ago
Recoverable Robust Timetables on Trees
In the context of scheduling and timetabling, we study a challenging combinatorial problem which is very interesting for both practical and theoretical points of view. The motivati...
Gianlorenzo D'Angelo, Gabriele Di Stefano, Alfredo...
MOBIDE
2009
ACM
14 years 10 days ago
Data-aware connectivity in mobile replicated systems
Optimistic replication is a fundamental technique for supporting concurrent work practices in mobile environments. However, due to sudden and frequent transitions to weakly connec...
João Pedro Barreto, João Garcia, Lu&...