Sciweavers

AINA
2007
IEEE
14 years 5 months ago
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems
Abstract— Structured peer-to-peer systems have grown enormously because of their scalability, efficiency and reliability. These systems assign a unique identifier to each user ...
Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Pa...
AINA
2007
IEEE
14 years 5 months ago
Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation
Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Taka...
AINA
2007
IEEE
14 years 5 months ago
Conflict Free Address Allocation Mechanism for Mobile Ad Hoc Networks
A Mobile Ad-hoc Network (MANET) can be implemented anywhere where there is little or no communication infrastructure, or the existing infrastructure is inconvenient to use. A numb...
Sudath Indrasinghe, Rubem Pereira, John Haggerty
AINA
2007
IEEE
14 years 5 months ago
Sizing Router Buffers for Large-Scale TCP/IP Networks
— We investigate the validity of reducing router buffer size in a large-scale network that includes both core networks and edge networks. We first devise a novel mathematical an...
Hiroyuki Hisamatsu, Go Hasegawa, Masayuki Murata
AINA
2007
IEEE
14 years 5 months ago
Synthetic Trace-Driven Simulation of Cache Memory
The widening gap between CPU and memory speed has made caches an integral feature of modern highperformance processors. The high degree of configurability of cache memory can requ...
Rahman Hassan, Antony Harris, Nigel P. Topham, Ari...
AINA
2007
IEEE
14 years 5 months ago
Reliability-Driven Scheduling of Periodic Tasks in Heterogeneous Real-Time Systems
In this paper we comprehensively investigated the issue of reliability-driven real-time scheduling for periodic tasks in heterogeneous systems. First, we built a reliability model...
Wei Luo, Xiao Qin, Kiranmai Bellam
AINA
2007
IEEE
14 years 5 months ago
Extracting Significant Phrases from Text
Prospective readers can quickly determine whether a document is relevant to their information need if the significant phrases (or keyphrases) in this document are provided. Althou...
Yuan J. Lui, Richard Brent, Ani Calinescu
AINA
2007
IEEE
14 years 5 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
AINA
2007
IEEE
14 years 5 months ago
Reducing the Complexity in the Distributed Multiplication Protocol of Two Polynomially Shared Values
The multiparty multiplication of two polynomially shared values over Zq with a public prime number q is an important module in distributed computations. The multiplication protoco...
Peter Lory
AINA
2007
IEEE
14 years 5 months ago
Convergent Online Charging for Context-Aware Mobile Services
Personalized and context-aware services are of high interest for Mobile Network Operators (MNOs) to keep existing and win new subscribers. Although such services are already avail...
Frank Bormann, Stephan Flake, Jürgen Tacken