Sciweavers

582 search results - page 44 / 117
» Too Much Middleware
Sort
View
TCC
2007
Springer
93views Cryptology» more  TCC 2007»
14 years 2 months ago
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
Abstract. We construct an intrusion-resilient symmetric-key authenticated key exchange (AKE) protocol in the bounded retrieval model. The model employs a long shared private key to...
David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke L...
WISE
2006
Springer
14 years 2 months ago
SCEND: An Efficient Semantic Cache to Adequately Explore Answerability of Views
Maintaining a semantic cache of materialized XPath views inside or outside the database, is a novel, feasible and efficient approach to accelerate XML query processing. However, th...
Guoliang Li, Jianhua Feng, Na Ta, Yong Zhang, Lizh...
METAINFORMATICS
2004
Springer
14 years 1 months ago
Looking Beyond Computer Applications: Investigating Rich Structures
Spatial structure supporting applications offer an abstract level of what can be found in the real world. However, in many systems, objects are aligned straight, rotation is not p...
Claus Atzenbeck, Peter J. Nürnberg
ISCC
2003
IEEE
152views Communications» more  ISCC 2003»
14 years 1 months ago
Dynamic Fair Queuing (DFQ): A Novel Fair Scheduler Improving Wireless Transmission over Hybrid LANs
Local area network (LAN) will be a hybrid network that includes wired and wireless links together. Nonetheless, the wired hosts always take the most bandwidth and bring about the ...
Ce-Kuen Shieh, Yu-Ben Miao, Ming-Qi Shieh, Wen-Shy...
ISCC
2003
IEEE
113views Communications» more  ISCC 2003»
14 years 1 months ago
Channel Sharing of Competing Flows in Ad Hoc Networks
This paper studies the fairness with which competing flows share the channel in ad hoc networks using collision avoidance protocols. It is shown that the required multihop coordi...
Yu Wang, J. J. Garcia-Luna-Aceves