Sciweavers

2642 search results - page 84 / 529
» The development of Chez Scheme
Sort
View
TKDE
2002
140views more  TKDE 2002»
13 years 9 months ago
Transaction Processing in Mobile, Heterogeneous Database Systems
As technological advances are made in software and hardware, the feasibility of accessing information "any time, anywhere" is becoming a reality. Furthermore, the diversi...
James B. Lim, Ali R. Hurson
ICC
2007
IEEE
154views Communications» more  ICC 2007»
14 years 1 months ago
Topology Management in CogMesh: A Cluster-Based Cognitive Radio Mesh Network
As the radio spectrum usage paradigm shifting from the traditional command and control allocation scheme to the open spectrum allocation scheme, wireless mesh networks meet new opp...
Tao Chen, Honggang Zhang, Gian Mario Maggio, Imric...
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
14 years 1 months ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio
USENIX
2007
14 years 8 days ago
Supporting Practical Content-Addressable Caching with CZIP Compression
Content-based naming (CBN) enables content sharing across similar files by breaking files into positionindependent chunks and naming these chunks using hashes of their contents....
KyoungSoo Park, Sunghwan Ihm, Mic Bowman, Vivek S....
IWCMC
2010
ACM
13 years 12 months ago
Using connection expansion to reduce control traffic in MANETs
We consider the problem of control traffic overhead in MANETs with long-lived connections, operating under a reactive routing protocol (e.g. AODV). In such settings, control traff...
Zeki Bilgin, Bilal Khan, Ala I. Al-Fuqaha