Sciweavers

1653 search results - page 297 / 331
» Timed analysis of security protocols
Sort
View
IIWAS
2003
13 years 9 months ago
Zero-Latency Data Warehousing for Heterogeneous Data Sources and Continuous Data Streams
In this paper, a framework for building an overall Zero-Latency Data Warehouse system (ZLDWH) is provided. Such a ZLDWH requires tasks such as data changes detection, continuous l...
Tho Manh Nguyen, A. Min Tjoa
CORR
2006
Springer
112views Education» more  CORR 2006»
13 years 7 months ago
Pull-Based Data Broadcast with Dependencies: Be Fair to Users, not to Items
Broadcasting is known to be an efficient means of disseminating data in wireless communication environments (such as Satellite, mobile phone networks,...). It has been recently ob...
Julien Robert, Nicolas Schabanel
TKDE
2008
137views more  TKDE 2008»
13 years 7 months ago
GossipTrust for Fast Reputation Aggregation in Peer-to-Peer Networks
Abstract-- In peer-to-peer (P2P) networks, reputation aggregation and peer ranking are the most time-consuming and spacedemanding operations. This paper proposes a gossip-based rep...
Runfang Zhou, Kai Hwang, Min Cai
ICRA
2002
IEEE
181views Robotics» more  ICRA 2002»
14 years 16 days ago
The BlueDRAGON - A System for Measuring the Kinematics and the Dynamics of Minimally Invasive Surgical Tools In-Vivo
Minimally invasive surgery (MIS) involves a multidimensional series of tasks requiring a synthesis between visual information and the kinematics and dynamics of the surgical tools...
Jacob Rosen, Jeffrey D. Brown, Lily Chang, Marco B...
CCR
2010
139views more  CCR 2010»
13 years 7 months ago
Longitudinal study of BGP monitor session failures
BGP routing data collected by RouteViews and RIPE RIS have become an essential asset to both the network research and operation communities. However, it has long been speculated t...
Pei-chun Cheng, Xin Zhao, Beichuan Zhang, Lixia Zh...