Sciweavers

1010 search results - page 56 / 202
» Computational Differences between Asymmetrical and Symmetric...
Sort
View
AC
2008
Springer
14 years 12 months ago
Computing with RFID- Drivers, Technology and Implications
Radio Frequency Identification or simply rfid has come to be an integral part of modern computing. Rfid is notable in that it is the first practical technology to tightly couple p...
George Roussos
CORR
2010
Springer
110views Education» more  CORR 2010»
14 years 12 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
CCGRID
2007
IEEE
15 years 6 months ago
Economy-based Content Replication for Peering Content Delivery Networks
: Existing Content Delivery Networks (CDNs) exhibit the nature of closed delivery networks which do not cooperate with other CDNs and in practice, islands of CDNs are formed. The l...
Al-Mukaddim Khan Pathan, Rajkumar Buyya
LCN
2005
IEEE
15 years 5 months ago
Differentiation of Downlink 802.11e Traffic in the Virtual Collision Handler
— A number of analytical models have been proposed to describe the priority schemes of the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard. EDCA...
Paal Engelstad, Olav N. Østerbø
AUSDM
2008
Springer
237views Data Mining» more  AUSDM 2008»
15 years 1 months ago
On Inconsistencies in Quantifying Strength of Community Structures
Complex network analysis involves the study of the properties of various real world networks. In this broad field, research on community structures forms an important sub area. Th...
Wen Haw Chong