Sciweavers

1354 search results - page 180 / 271
» Quantum Service Selection
Sort
View
ICCNMC
2005
Springer
14 years 2 months ago
Curve-Based Greedy Routing Algorithm for Sensor Networks
Routing packets along a specified curve is a new approach to forwarding packets in large-scale dense sensor networks. Forwarding packets along trajectories can be very effective in...
Jin Zhang, Yaping Lin, Mu Lin, Ping Li, Si-wang Zh...
IH
2005
Springer
14 years 2 months ago
Censorship Resistance Revisited
Abstract. “Censorship resistant” systems attempt to prevent censors from imposing a particular distribution of content across a system. In this paper, we introduce a variation ...
Ginger Perng, Michael K. Reiter, Chenxi Wang
VLDB
2005
ACM
151views Database» more  VLDB 2005»
14 years 2 months ago
Query Execution Assurance for Outsourced Databases
In this paper we propose and analyze a method for proofs of actual query execution in an outsourced database framework, in which a client outsources its data management needs to a...
Radu Sion
DISCEX
2003
IEEE
14 years 2 months ago
Statistical Approaches to DDoS Attack Detection and Response
The nature of the threats posed by Distributed Denial of Service (DDoS) attacks on large networks, such as the Internet, demands effective detection and response methods. These me...
Laura Feinstein, Dan Schnackenberg, Ravindra Balup...
JCDL
2009
ACM
103views Education» more  JCDL 2009»
14 years 1 months ago
Query parameters for harvesting digital video and associated contextual information
Video is increasingly important to digital libraries and archives as both primary content and as context for the primary objects in collections. Services like YouTube not only off...
Gary Marchionini, Chirag Shah, Christopher A. Lee,...