Sciweavers

11580 search results - page 2040 / 2316
» Communication vs. Computation
Sort
View
139
Voted
COMCOM
2008
138views more  COMCOM 2008»
15 years 5 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
COMPSEC
2008
138views more  COMPSEC 2008»
15 years 5 months ago
SMSSec: An end-to-end protocol for secure SMS
Short Message Service is usually used to transport unclassified information, but with the rise of mobile commerce it has become an integral tool for conducting business. However S...
Johnny Li-Chang Lo, Judith Bishop, Jan H. P. Eloff
CORR
2010
Springer
255views Education» more  CORR 2010»
15 years 5 months ago
Scalable Tensor Factorizations for Incomplete Data
The problem of incomplete data--i.e., data with missing or unknown values--in multi-way arrays is ubiquitous in biomedical signal processing, network traffic analysis, bibliometri...
Evrim Acar, Tamara G. Kolda, Daniel M. Dunlavy, Mo...
CONCURRENCY
2008
128views more  CONCURRENCY 2008»
15 years 5 months ago
Service-oriented approach to collaborative visualization
This paper presents a new service-oriented approach to the design and implementation of visualization systems in a Grid computing environment. The approach evolves the traditional...
H. Wang, Ken W. Brodlie, James W. Handley, Jason W...
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 5 months ago
Secure Transmission with Multiple Antennas II: The MIMOME Wiretap Channel
The capacity of the Gaussian wiretap channel model is analyzed when there are multiple antennas at the sender, intended receiver and eavesdropper. The associated channel matrices a...
Ashish Khisti, Gregory W. Wornell
« Prev « First page 2040 / 2316 Last » Next »