Sciweavers

16518 search results - page 3174 / 3304
» A New Approach to Splitting-Off
Sort
View
WS
2005
ACM
15 years 6 months ago
Hotspot-based traceback for mobile ad hoc networks
Traceback schemes are useful to identify the source of an attack. Existing traceback systems are not suitable for Mobile Ad Hoc Networks (MANET) because they rely on assumptions s...
Yi-an Huang, Wenke Lee
133
Voted
ASIACRYPT
2005
Springer
15 years 6 months ago
Adapting Density Attacks to Low-Weight Knapsacks
Cryptosystems based on the knapsack problem were among the first public-key systems to be invented. Their high encryption/decryption rate attracted considerable interest until it ...
Phong Q. Nguyen, Jacques Stern
BIRTHDAY
2005
Springer
15 years 6 months ago
Splitting Logics
This paper addresses the question of factoring a logic into families of (generally simpler) components, estimating the top– down perspective, splitting, versus the bottom–up, s...
Walter Alexandre Carnielli, Marcelo E. Coniglio
BTW
2005
Springer
112views Database» more  BTW 2005»
15 years 6 months ago
Valid Updates for Persistent XML Objects
: XML has emerged as the industry standard for representing and exchanging data and is already predominant in several applications today. Business, analytic and structered data wil...
Henrike Schuhart, Volker Linnemann
114
Voted
CAISE
2005
Springer
15 years 6 months ago
Dynamic Load Balancing of Virtualized Database Services Using Hints and Load Forecasting
Abstract. Future database application systems will be designed as Service Oriented Architectures (SOAs), in contrast to today’s monolithic architectures. The decomposition in man...
Daniel Gmach, Stefan Krompass, Stefan Seltzsam, Ma...
« Prev « First page 3174 / 3304 Last » Next »