Sciweavers

464 search results - page 85 / 93
» SQAK: doing more with keywords
Sort
View
FC
2007
Springer
158views Cryptology» more  FC 2007»
14 years 1 months ago
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
Aggelos Kiayias, Hong-Sheng Zhou
CONEXT
2006
ACM
14 years 1 months ago
Synergy: blending heterogeneous measurement elements for effective network monitoring
Network traffic matrices are important for various network planning and management operations. Previous work for estimation of traffic matrices is based on either link load record...
Awais Ahmed Awan, Andrew W. Moore
IMC
2006
ACM
14 years 1 months ago
The need for cross-layer information in access point selection algorithms
The low price of commodity wireless LAN cards and access points (APs) has resulted in the rich proliferation of high density WLANs in enterprise, academic environments, and public ...
Karthikeyan Sundaresan, Konstantina Papagiannaki
MM
2006
ACM
93views Multimedia» more  MM 2006»
14 years 1 months ago
Scaling laws and tradeoffs in peer-to-peer live multimedia streaming
It is well-known that live multimedia streaming applications operate more efficiently when organized in peer-to-peer (P2P) topologies, since peer upload capacities are utilized t...
Tara Small, Ben Liang, Baochun Li
VEE
2005
ACM
218views Virtualization» more  VEE 2005»
14 years 1 months ago
The pauseless GC algorithm
Modern transactional response-time sensitive applications have run into practical limits on the size of garbage collected heaps. The heap can only grow until GC pauses exceed the ...
Cliff Click, Gil Tene, Michael Wolf