Sciweavers

4305 search results - page 719 / 861
» Analysing Protocol Implementations
Sort
View
131
Voted
SEMWEB
2009
Springer
15 years 10 months ago
Executing SPARQL Queries over the Web of Linked Data
The Web of Linked Data forms a single, globally distributed dataspace. Due to the openness of this dataspace, it is not possible to know in advance all data sources that might be r...
Olaf Hartig, Christian Bizer, Johann Christoph Fre...
MOBICOM
2009
ACM
15 years 10 months ago
SAM: enabling practical spatial multiple access in wireless LAN
Spatial multiple access holds the promise to boost the capacity of wireless networks when an access point has multiple antennas. Due to the asynchronous and uncontrolled nature of...
Kun Tan, He Liu, Ji Fang, Wei Wang, Jiansong Zhang...
AFRICACRYPT
2010
Springer
15 years 10 months ago
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-prese...
Marcel Medwed, François-Xavier Standaert, J...
ANSS
2008
IEEE
15 years 10 months ago
SCAR - Scattering, Concealing and Recovering Data within a DHT
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...
Bryan N. Mills, Taieb Znati
BIBM
2008
IEEE
110views Bioinformatics» more  BIBM 2008»
15 years 10 months ago
Genome Alignments Using MPI-LAGAN
We develop a parallel algorithm for a widely used whole genome alignment method called LAGAN. We use the MPI-based protocol to develop parallel solutions for two phases of the alg...
Ruinan Zhang, Huzefa Rangwala, George Karypis