Sciweavers

2039 search results - page 352 / 408
» A Metric for the Evaluation of Imitation
Sort
View
SAC
2002
ACM
14 years 9 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
TAPOS
1998
126views more  TAPOS 1998»
14 years 9 months ago
Design of Class Hierarchies Based on Concept (Galois) Lattices
Building and maintaining the class hierarchy has been recognized as an important but one of the most difficult activities of object-oriented design. Concept (or Galois) lattices a...
Robert Godin, Hafedh Mili, Guy W. Mineau, Rokia Mi...
TC
2002
14 years 9 months ago
Coordinated En-Route Web Caching
Web caching is an important technique for reducing Internet access latency, network traffic, and server load. This paper investigates cache management strategies for en-route web ...
Xueyan Tang, Samuel T. Chanson
TELSYS
2002
73views more  TELSYS 2002»
14 years 9 months ago
Avoiding Counting to Infinity in Distance Vector Routing
The Routing Information Protocol (RIP) may introduce misleading routing information into the routing table, due to network topology changes such as link or router failures. This is...
Andreas Schmid, Christoph Steigner
TPDS
2002
80views more  TPDS 2002»
14 years 9 months ago
Performance Optimization Problem in Speculative Prefetching
Speculative prefetching has been proposed to improve the response time of network access. Previous studies in speculative prefetching focus on building and evaluating access models...
Nor Jaidi Tuah, Mohan Kumar, Svetha Venkatesh, Saj...