Sciweavers

209 search results - page 13 / 42
» Time Scaling of Chaotic Systems: Application to Secure Commu...
Sort
View
ICICS
2007
Springer
13 years 11 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia
INFOCOM
2008
IEEE
14 years 2 months ago
HyperCBR: Large-Scale Content-Based Routing in a Multidimensional Space
Abstract—Content-based routing (CBR) is becoming increasingly popular as a building block for distributed applications. CBR differs from classical routing paradigms as messages a...
Stefano Castelli, Paolo Costa, Gian Pietro Picco
BROADNETS
2007
IEEE
13 years 11 months ago
SAABCOT: Secure application-agnostic bandwidth conservation techniques
Abstract-- High speed modern networks are tasked with moving large amounts of data to diverse groups of interested parties. Often under heavy loads, a significant portion of the da...
Chad D. Mano, David Salyers, Qi Liao, Andrew Blaic...
ICPADS
1996
IEEE
13 years 12 months ago
Implementation of MAP: A system for mobile assistant programming
We have de ne a network programming model called Mobile Assistant Programming (MAP) for development and execution of communication applications in large scale networks of heteroge...
Stéphane Perret, Andrzej Duda
CAISE
2003
Springer
14 years 27 days ago
Hybrid Publish-Subscribe: A Compromise Approach for Large-Scale
Abstract. The purpose of this article is to propose a scalable, topologically and traffic-wise self-adapting approach to a publish/subscribe paradigm for supporting event-based app...
Roman Szarowski