Sciweavers

AINA
2007
IEEE
13 years 11 months ago
Extracting Significant Phrases from Text
Prospective readers can quickly determine whether a document is relevant to their information need if the significant phrases (or keyphrases) in this document are provided. Althou...
Yuan J. Lui, Richard Brent, Ani Calinescu
AINA
2007
IEEE
13 years 11 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
AINA
2007
IEEE
13 years 11 months ago
Reducing the Complexity in the Distributed Multiplication Protocol of Two Polynomially Shared Values
The multiparty multiplication of two polynomially shared values over Zq with a public prime number q is an important module in distributed computations. The multiplication protoco...
Peter Lory
AINA
2007
IEEE
13 years 11 months ago
Convergent Online Charging for Context-Aware Mobile Services
Personalized and context-aware services are of high interest for Mobile Network Operators (MNOs) to keep existing and win new subscribers. Although such services are already avail...
Frank Bormann, Stephan Flake, Jürgen Tacken
AINA
2007
IEEE
13 years 11 months ago
On the Miscollaboration of Congestion Control Mechanisms at the Transport and the Network Layers
Many sophisticated mechanisms have been implemented at both the transport and the network layers in order to estimate network conditions and avoid overload of network links. We ev...
Ageliki Tsioliaridou, Christos V. Samaras, Vassili...
AINA
2007
IEEE
13 years 11 months ago
Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules
The random oracle model is an idealized theoretical model that has been successfully used for designing many cryptographic algorithms and protocols. Unfortunately, a series of res...
Vandana Gunupudi, Stephen R. Tate
AINA
2007
IEEE
13 years 11 months ago
A Decentralized Authorization Architecture
We present a decentralized authorization architecture based on capabilities in which parties are able to exercise full control over their resources or delegate it in an ad-hoc man...
Feike W. Dillema, Simone Lupetti, Tage Stabell-Kul...
AINA
2007
IEEE
13 years 11 months ago
Effective Caching in Wireless Sensor Network
— This paper proposes few ways of improving a WSN’s energy efficiency that already uses an energy efficient data routing protocol for continuous monitoring application. The p...
Md. Ashiqur Rahman, Sajid Hussain
AINA
2007
IEEE
13 years 11 months ago
Enforcing Fine-Grained Authorization Policies for Java Mobile Agents
The Mobile Agent (MA) paradigm advocates the migration of agent code to achieve computational goals. MAs require an executable environment on hosts where mobile code can be execut...
Giovanni Russello, Changyu Dong, Naranker Dulay
AINA
2007
IEEE
13 years 11 months ago
A Routing Metric for Load-Balancing in Wireless Mesh Networks
This paper proposes a routing metric known as Weighted Cumulative Expected Transmission Time with Load Balancing (WCETT-LB) for wireless mesh networks. WCETTT-LB enhances the basi...
Liang Ma, Mieso K. Denko