Sciweavers

473 search results - page 71 / 95
» The Price of Validity in Dynamic Networks
Sort
View
CN
2007
99views more  CN 2007»
13 years 8 months ago
Design and implementation of a secure wide-area object middleware
Wide-area service replication is becoming increasingly common, with the emergence of new operational models such as content delivery networks and computational grids. This paper d...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
BIBM
2008
IEEE
112views Bioinformatics» more  BIBM 2008»
14 years 2 months ago
Fast Alignments of Metabolic Networks
Network alignments are extensively used for comparing, exploring, and predicting biological networks. Existing alignment tools are mostly based on isomorphic and homeomorphic embe...
Qiong Cheng, Piotr Berman, Robert W. Harrison, Ale...
INFOCOM
2000
IEEE
14 years 11 days ago
Topology Discovery in Heterogeneous IP Networks
Abstract— Knowledge of the up-to-date physical topology of an IP network is crucial to a number of critical network management tasks, including reactive and proactive resource ma...
Yuri Breitbart, Minos N. Garofalakis, Cliff Martin...
ICC
2007
IEEE
170views Communications» more  ICC 2007»
14 years 2 months ago
Optimal Bandwidth Provision at WiMAX MAC Service Access Point on Uplink Direction
—In this paper, the IEEE 802.16 protocol is investigated with respect to the bandwidth provision problem arising at the Medium Access Control (MAC) layer. The aim is to optimally...
Mario Marchese, Maurizio Mongelli
PERVASIVE
2007
Springer
14 years 2 months ago
Shake Well Before Use: Authentication Based on Accelerometer Data
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Rene Mayrhofer, Hans Gellersen