Sciweavers

224 search results - page 42 / 45
» Transformations between Cryptographic Protocols
Sort
View
SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
14 years 8 months ago
Extensible optimization in overlay dissemination trees
We introduce XPORT, a profile-driven distributed data dissemination system that supports an extensible set of data types, profile types, and optimization metrics. XPORT efficientl...
Olga Papaemmanouil, Yanif Ahmad, Ugur Çetin...
SIGMOD
2006
ACM
113views Database» more  SIGMOD 2006»
14 years 8 months ago
XPORT: extensible profile-driven overlay routing trees
XPORT is a profile-driven distributed data dissemination system that supports an extensible set of data types, profiles types, and optimization metrics. XPORT efficiently implemen...
Olga Papaemmanouil, Yanif Ahmad, Ugur Çetin...
RAM
2008
IEEE
172views Robotics» more  RAM 2008»
14 years 2 months ago
VT Position Code Communication Technology and Its Implementation
Eelectronic device technology has been monopolized by binary system for many years. The circs not only makes it impossible to break through the existing technology bottleneck, but...
ShiYing Zhou, GuiHe Qin, YuBo Jin
INFOCOM
2005
IEEE
14 years 2 months ago
On static reachability analysis of IP networks
The primary purpose of a network is to provide reachability between applications running on end hosts. In this paper, we describe how to compute the reachability a network provide...
Geoffrey G. Xie, Jibin Zhan, David A. Maltz, Hui Z...
ICDCSW
2002
IEEE
14 years 1 months ago
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical s...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...