Sciweavers

681 search results - page 17 / 137
» Columnar objects: improving the performance of analytical ap...
Sort
View
ISCC
2003
IEEE
112views Communications» more  ISCC 2003»
15 years 4 months ago
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Albert Levi, Erkay Savas
102
Voted
FC
2008
Springer
134views Cryptology» more  FC 2008»
15 years 20 days ago
Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evaluation (SFE) protocols. However, interaction is a pri...
Vandana Gunupudi, Stephen R. Tate
VLDB
1994
ACM
119views Database» more  VLDB 1994»
15 years 3 months ago
Bulk Loading into an OODB: A Performance Study
Object-oriented database OODB users bring with them large quantities of legacy data megabytes and even gigabytes. In addition, scienti c OODB users continually generate new data. ...
Janet L. Wiener, Jeffrey F. Naughton
IJCSA
2008
237views more  IJCSA 2008»
14 years 11 months ago
Development of A SOLAP Patrimony Management Application System: Fez Medina as a Case Study
It is well known that transactional and analytical systems each require different database architecture. In general, the database structure of transactional systems is optimized f...
I. Salam, M. El Mohajir, A. Taleb, B. El Mohajir
PCM
2004
Springer
120views Multimedia» more  PCM 2004»
15 years 4 months ago
MULTFRC-LERD: An Improved Rate Control Scheme for Video Streaming over Wireless
Abstract. We propose the Loss Event Rate Discounting scheme to improve the performance of MULTFRC over wireless networks. In our MULTFRC-LERD scheme, each TFRC connection includes ...
Xiaolin Tong, Qingming Huang