Sciweavers

4376 search results - page 699 / 876
» Data Management in Sensor Networks
Sort
View
110
Voted
IJNSEC
2010
143views more  IJNSEC 2010»
14 years 5 months ago
A New Secure Remote User Authentication Scheme with Smart Cards
Remote user authentication scheme is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. These types of schemes ...
Manoj Kumar
NCA
2003
IEEE
15 years 3 months ago
Optimal Content Placement for En-Route Web Caching
This paper studies the optimal placement of web files for en-route web caching. It is shown that existing placement policies are all solving restricted partial problems of the ...
Anxiao Jiang, Jehoshua Bruck
75
Voted
ALENEX
2009
118views Algorithms» more  ALENEX 2009»
14 years 11 months ago
Solving Maximum Flow Problems on Real World Bipartite Graphs
In this paper we present an experimental study of several maximum flow algorithms in the context of unbalanced bipartite networks. Our experiments are motivated by a real world pr...
Cosmin Silvestru Negruseri, Mircea Bogdan Pasoi, B...
SIGCOMM
2012
ACM
13 years 19 days ago
Bulk of interest: performance measurement of content-centric routing
The paradigm of information-centric networking subsumes recent approaches to integrate content replication services into a future Internet layer. Current concepts foster either a ...
Matthias Wählisch, Thomas C. Schmidt, Markus ...
PDP
2005
IEEE
15 years 3 months ago
FOBr: A Version-Based Recovery Protocol For Replicated Databases
Within the field of databases that are deployed in distributed environments there is a need to guarantee consistency among replicas and availability among nodes despite of networ...
Francisco Castro-Company, Luis Irún-Briz, F...