Sciweavers

1847 search results - page 278 / 370
» Computational Science Simulations Based on Web Services
Sort
View
FOCS
2010
IEEE
14 years 11 months ago
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of s...
Ran Canetti, Huijia Lin, Rafael Pass
WCNC
2010
IEEE
14 years 12 months ago
Applying Spring-Relaxation Technique in Cellular Network Localization
—This paper presents a simple solution suitable for the mandatory localization function for E-911 services specified by FCC. Our solution introduces zero-length spring technique...
Qing Zhang, Chuan Heng Foh, Boon-Chong Seet, Alvis...
WWW
2010
ACM
15 years 8 months ago
Object views: fine-grained sharing in browsers
Browsers do not currently support the secure sharing of JavaScript objects between principals. We present this problem as the need for object views, which are consistent and contr...
Leo A. Meyerovich, Adrienne Porter Felt, Mark S. M...
GLOBECOM
2009
IEEE
14 years 11 months ago
Performance Modeling for Heterogeneous Wireless Networks with Multiservice Overflow Traffic
Performance modeling is important for the purpose of developing efficient dimensioning tools for large complicated networks. But it is difficult to achieve in heterogeneous wireles...
Qian Huang, King-Tim Ko, Villy Bæk Iversen
INFOCOM
2002
IEEE
15 years 6 months ago
Fair Scheduling and Buffer Management in Internet Routers
Abstract—Input buffered switch architecture has become attractive for implementing high performance routers and expanding use of the Internet sees an increasing need for quality ...
Nan Ni, Laxmi N. Bhuyan