Sciweavers

2797 search results - page 519 / 560
» Code query by example
Sort
View
JSW
2008
196views more  JSW 2008»
15 years 2 months ago
Providing Data Items with Time Constraints in Multi-Channel Broadcasting Environments
In a mobile computing system, users carrying portable devices can access database services from any location without requiring a fixed position in the networking environment. Some ...
Ding-Jung Chiang, Hwei-Jen Lin, Timothy K. Shih
118
Voted
JUCS
2008
156views more  JUCS 2008»
15 years 2 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
132
Voted
JPDC
2006
133views more  JPDC 2006»
15 years 2 months ago
Locality in structured peer-to-peer networks
Distributed hash tables (DHTs), used in a number of structured peer-to-peer (P2P) systems provide efficient mechanisms for resource placement and location. A key distinguishing fe...
Ronaldo A. Ferreira, Suresh Jagannathan, Ananth Gr...
MTA
2008
134views more  MTA 2008»
15 years 2 months ago
A survey of content based 3D shape retrieval methods
Recent developments in techniques for modeling, digitizing and visualizing 3D shapes has led to an explosion in the number of available 3D models on the Internet and in domain-spe...
Johan W. H. Tangelder, Remco C. Veltkamp
NETWORK
2008
139views more  NETWORK 2008»
15 years 2 months ago
Composing semantic services in open sensor-rich environments
Consider a scenario where Jane is at an airport. She wants to find a restaurant with healthy food and short waiting time on the way to her terminal. The airport can provide such s...
Jie Liu, Feng Zhao