Sciweavers

1428 search results - page 78 / 286
» aims 2010
Sort
View
IJISEC
2010
87views more  IJISEC 2010»
15 years 2 months ago
How to construct identity-based signatures without the key escrow problem
The inherent key escrow problem is one of the main reasons for the slow adoption of identity-based cryptography. The existing solution for mitigating the key escrow problem is by a...
Tsz Hon Yuen, Willy Susilo, Yi Mu
INFOCOM
2010
IEEE
15 years 2 months ago
DiffProbe: Detecting ISP Service Discrimination
Abstract—We propose an active probing method, called Differential Probing or DiffProbe, to detect whether an access ISP is deploying forwarding mechanisms such as priority schedu...
Partha Kanuparthy, Constantine Dovrolis
IR
2010
15 years 2 months ago
Gradient descent optimization of smoothed information retrieval metrics
Abstract Most ranking algorithms are based on the optimization of some loss functions, such as the pairwise loss. However, these loss functions are often different from the criter...
Olivier Chapelle, Mingrui Wu
ISOLA
2010
Springer
15 years 2 months ago
On-the-Fly Interoperability through Automated Mediator Synthesis and Monitoring
Abstract. Interoperability is a key and challenging requirement in today’s and future systems, which are often characterized by an extreme level of heterogeneity. To build an int...
Antonia Bertolino, Paola Inverardi, Valérie...
ISOLA
2010
Springer
15 years 2 months ago
Flow Control with (Min, +) Algebra
According to the theory of Network Calculus based on the (min,+) algebra, analysis and measure of worst-case performance in communication networks can be made easily. In this conte...
Euriell Le Corronc, Bertrand Cottenceau, Laurent H...