Sciweavers

4998 search results - page 834 / 1000
» The case for intentional networking
Sort
View
PKC
2009
Springer
129views Cryptology» more  PKC 2009»
14 years 9 months ago
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed unde...
Colin Boyd, Juan Manuel González Nieto, M. ...
KDD
2007
ACM
184views Data Mining» more  KDD 2007»
14 years 9 months ago
GraphScope: parameter-free mining of large time-evolving graphs
How can we find communities in dynamic networks of social interactions, such as who calls whom, who emails whom, or who sells to whom? How can we spot discontinuity timepoints in ...
Jimeng Sun, Christos Faloutsos, Spiros Papadimitri...
VLDB
2005
ACM
177views Database» more  VLDB 2005»
14 years 9 months ago
Indexing mobile objects using dual transformations
With the recent advances in wireless networks, embedded systems and GPS technology, databases that manage the location of moving objects have received increased interest. In this ...
George Kollios, Dimitris Papadopoulos, Dimitrios G...
PODS
2005
ACM
131views Database» more  PODS 2005»
14 years 9 months ago
Space efficient mining of multigraph streams
The challenge of monitoring massive amounts of data generated by communication networks has led to the interest in data stream processing. We study streams of edges in massive com...
Graham Cormode, S. Muthukrishnan
EDBT
2008
ACM
151views Database» more  EDBT 2008»
14 years 9 months ago
Decentralized managing of replication objects in massively distributed systems
Data replication is a central technique to increase availability and performance of distributed systems. While offering many advantages it also requires more effort for ensuring d...
Daniel Klan, Kai-Uwe Sattler, Katja Hose, Marcel K...