Sciweavers

828 search results - page 79 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
NCA
2009
IEEE
15 years 10 months ago
Introducing Virtual Execution Environments for Application Lifecycle Management and SLA-Driven Resource Distribution within Serv
Abstract—Resource management is a key challenge that service providers must adequately face in order to ensure their profitability. This paper describes a proof-of-concept frame...
Iñigo Goiri, Ferran Julià, Jorge Eja...
NDSS
2009
IEEE
15 years 10 months ago
Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases
Many existing privacy-preserving techniques for querying distributed databases of sensitive information do not scale for large databases due to the use of heavyweight cryptographi...
Sherman S. M. Chow, Jie-Han Lee, Lakshminarayanan ...
EUROPAR
2008
Springer
15 years 4 months ago
Transparent Mobile Middleware Integration for Java and .NET Development Environments
Developing a distributed application for mobile resource constrained devices is a difficult and error-prone task that requires awareness of several system-level details (e.g., faul...
Edgar Marques, Luís Veiga, Paulo Ferreira
109
Voted
INFOCOM
2003
IEEE
15 years 8 months ago
TCP-LP: A Distributed Algorithm for Low Priority Data Transfer
— Service prioritization among different traffic classes is an important goal for the future Internet. Conventional approaches to solving this problem consider the existing best...
Aleksandar Kuzmanovic, Edward W. Knightly
ICDCSW
2009
IEEE
15 years 9 months ago
An Approach to Middleware Specialization for Cyber Physical Systems
Contemporary computing infrastructure, such as networking stacks, OS and middleware, are made up of layers of software functionality that have evolved over decades to support the ...
Akshay Dabholkar, Aniruddha S. Gokhale