Sciweavers

285 search results - page 49 / 57
» Characterization of the Existence of Galled-Tree Networks
Sort
View
GLOBECOM
2007
IEEE
15 years 6 months ago
Power-Modulated Challenge-Response Schemes for Verifying Location Claims
—Location information should be verifiable in order to support new computing and information services. In this paper, we adapt the classical challenge-response method for authen...
Yu Zhang, Zang Li, Wade Trappe
HICSS
2007
IEEE
164views Biometrics» more  HICSS 2007»
15 years 6 months ago
The Social Structure of Tagging Internet Video on del.icio.us
Abstract— The ability to tag resources with uncontrolled metadata or “folksonomies” is often characterized as one of the central features of “Web 2.0” applications. Folks...
John C. Paolillo, Shashikant Penumarthy
ICAT
2007
IEEE
15 years 6 months ago
Exploiting Virtual Objects' Attributes and Avatar's Behavior in DVEs Partitioning
Partitioning constitutes one of the most critical challenges a distributed virtual environment needs to handle and is related to the efficient assignment of the existing entities ...
Christos Bouras, Eri Giannaka, Thrasyvoulos Tsiats...
IPPS
2007
IEEE
15 years 6 months ago
New Results on the Performance Effects of Autocorrelated Flows in Systems
Temporal dependence within the workload of any computing or networking system has been widely recognized as a significant factor affecting performance. More specifically, burstin...
Evgenia Smirni, Qi Zhang, Ningfang Mi, Alma Riska,...
LPAR
2007
Springer
15 years 5 months ago
Deciding Knowledge in Security Protocols for Monoidal Equational Theories
Abstract. In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic funct...
Véronique Cortier, Stéphanie Delaune