Sciweavers

229 search results - page 46 / 46
» Construction of Virtual Working Environment and Evaluation o...
Sort
View
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
14 years 5 months ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...
SOSP
2003
ACM
14 years 2 months ago
Bullet: high bandwidth data dissemination using an overlay mesh
In recent years, overlay networks have become an effective alternative to IP multicast for efficient point to multipoint communication across the Internet. Typically, nodes self-...
Dejan Kostic, Adolfo Rodriguez, Jeannie R. Albrech...
MOBIQUITOUS
2007
IEEE
13 years 11 months ago
Minimum Disruption Service Composition and Recovery over Mobile Ad Hoc Networks
— The dynamic nature of mobile ad hoc networks poses fundamental challenges to the design of service composition schemes that can minimize the effect of service disruptions. Alth...
Shanshan Jiang, Yuan Xue, Douglas C. Schmidt
ERCIMDL
2006
Springer
234views Education» more  ERCIMDL 2006»
13 years 9 months ago
Intelligent Bibliography Creation and Markup for Authors: A Step Towards Interoperable Digital Libraries
The move towards integrated international Digital Libraries offers the opportunity of creating comprehensive data on citation networks. These data are not only invaluable pointers ...
Bettina Berendt, Kai Dingel, Christoph Hanser