Sciweavers

1744 search results - page 186 / 349
» The Steganographic File System
Sort
View
110
Voted
CSE
2009
IEEE
15 years 10 months ago
Analysing BitTorrent's Seeding Strategies
Abstract— BitTorrent is a typical peer-to-peer (P2P) file distribution application that has gained tremendous popularity in recent years. A considerable amount of research exists...
Xinuo Chen, Stephen A. Jarvis
SIGSOFT
2005
ACM
15 years 9 months ago
Detecting higher-level similarity patterns in programs
Cloning in software systems is known to create problems during software maintenance. Several techniques have been proposed to detect the same or similar code fragments in software...
Hamid Abdul Basit, Stan Jarzabek
194
Voted
ICDCS
2010
IEEE
15 years 1 months ago
Secure Ranked Keyword Search over Encrypted Cloud Data
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypte...
Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou
111
Voted
OSDI
2004
ACM
16 years 4 months ago
Boxwood: Abstractions as the Foundation for Storage Infrastructure
Abstractions as the Foundation for Storage Infrastructure John MacCormick, Nick Murphy, Marc Najork, Chandramohan A. Thekkath, and Lidong Zhou Microsoft Research Silicon Valley Wr...
John MacCormick, Nick Murphy, Marc Najork, Chandra...
FGCN
2007
IEEE
131views Communications» more  FGCN 2007»
15 years 10 months ago
Progressive Download for 3G Wireless Multicasting
This study focuses on the gain of using progressive download instead of legacy download for streamable media files for wireless multicasting networks. With progressive download, t...
Zeki Yetgin, Gamze Seckin