Sciweavers

5409 search results - page 866 / 1082
» Basic Observables for Processes
Sort
View
ISCC
2003
IEEE
112views Communications» more  ISCC 2003»
15 years 9 months ago
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Albert Levi, Erkay Savas
SRDS
2003
IEEE
15 years 9 months ago
Performance and Effectiveness Analysis of Checkpointing in Mobile Environments
Many mathematical models have been proposed to evaluate the execution performance of an application with and without checkpointing in the presence of failures. They assume that th...
Xinyu Chen, Michael R. Lyu
WECWIS
2003
IEEE
106views ECommerce» more  WECWIS 2003»
15 years 9 months ago
Contract Representation for Run-time Monitoring and Enforcement
Converting a conventional contract into an electronic equivalent that can be executed and enforced by computers is a challenging task. The difficulties are caused by the ambiguiti...
Carlos Molina-Jiménez, Santosh K. Shrivasta...
DOLAP
2003
ACM
15 years 9 months ago
Attribute value reordering for efficient hybrid OLAP
The normalization of a data cube is the process of choosing an ordering for the attribute values, and the chosen ordering will affect the physical storage of the cube’s data. For...
Owen Kaser, Daniel Lemire
NETGAMES
2003
ACM
15 years 9 months ago
A multi-user framework supporting video-based avatars
The application of Networked Virtual Environment (NVE) technology on mobile devices is an emerging area in research. The marketing potential for these types of applications, when ...
Peter Quax, Tom Jehaes, Pieter Jorissen, Wim Lamot...