Sciweavers

20878 search results - page 3947 / 4176
» Database
Sort
View
INFOCOM
2008
IEEE
15 years 10 months ago
A Novel Quantitative Approach For Measuring Network Security
—Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design secu...
Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan
MOBIQUITOUS
2008
IEEE
15 years 10 months ago
How to edit gigabyte XML files on a mobile phone with XAS, RefTrees, and RAXS
The Open Source mobility middleware developed in the Fuego Core project provides a stack for efficient XML processing on limited devices. Its components are a persistent map API, ...
Tancred Lindholm, Jaakko Kangasharju
117
Voted
NDSS
2008
IEEE
15 years 10 months ago
Usable PIR
In [22] we showed that existing single-server computational private information retrieval (PIR) protocols for the purpose of preserving client access patterns leakage are orders o...
Peter Williams, Radu Sion
144
Voted
NOMS
2008
IEEE
175views Communications» more  NOMS 2008»
15 years 10 months ago
Analysis of application performance and its change via representative application signatures
Abstract—Application servers are a core component of a multitier architecture that has become the industry standard for building scalable client-server applications. A client com...
Ningfang Mi, Ludmila Cherkasova, Kivanc M. Ozonat,...
142
Voted
ALPIT
2007
IEEE
15 years 9 months ago
Toward DB-IR Integration: Per-Document Basis Transactional Index Maintenance
While information retrieval (IR) and databases (DB) have been developed independently, there have been emerging requirements that both data management and efficient text retrieva...
Jinsuk Kim, Du-Seok Jin, Yunsoo Choi, Chang-Hoo Je...
« Prev « First page 3947 / 4176 Last » Next »