Sciweavers

502 search results - page 22 / 101
» Deploying a New Hash Algorithm
Sort
View
MATA
2004
Springer
113views Communications» more  MATA 2004»
15 years 5 months ago
PEARL: A PErformance evaluAtor of cRyptographic aLgorithms for Mobile Devices
Abstract. Limited computational power imposes new challenges during the implementation of security and privacy solutions for mobile devices. The choice for the most appropriate cry...
José Bringel Filho, Windson Viana, Rossana ...
VLDB
1998
ACM
123views Database» more  VLDB 1998»
15 years 4 months ago
Diag-Join: An Opportunistic Join Algorithm for 1:N Relationships
Time of creation is one of the predominant (often implicit) clustering strategies found not only in Data Warehouse systems: line items are created together with their correspondin...
Sven Helmer, Till Westmann, Guido Moerkotte
CIMCA
2008
IEEE
15 years 6 months ago
LGR: The New Genetic Based Scheduler for Grid Computing Systems
—The computational grid provides a promising platform for the deployment of various high-performance computing applications. In computational grid, an efficient scheduling of tas...
Leili Mohammad Khanli, Seyad Naser Razavi, Nima Ja...
CCS
2010
ACM
14 years 12 months ago
CRAFT: a new secure congestion control architecture
Congestion control algorithms seek to optimally utilize network resources by allocating a certain rate for each user. However, malicious clients can disregard the congestion contr...
Dongho Kim, Jerry T. Chiang, Yih-Chun Hu, Adrian P...
IWDC
2005
Springer
139views Communications» more  IWDC 2005»
15 years 5 months ago
A New Routing Protocol in Ad Hoc Networks with Unidirectional Links
Most of the proposed algorithms in ad hoc networks assume homogeneous nodes with similar transmission range and capabilities. However, in heterogeneous ad hoc network, it is not ne...
Deepesh Man Shrestha, Young-Bae Ko