Sciweavers

12562 search results - page 2306 / 2513
» Distributed Xbean Applications
Sort
View
CORR
2010
Springer
114views Education» more  CORR 2010»
15 years 3 months ago
Secure Lossy Source Coding with Side Information at the Decoders
This paper investigates the problem of secure lossy source coding in the presence of an eavesdropper with arbitrary correlated side informations at the legitimate decoder (referre...
Joffrey Villard, Pablo Piantanida
DATAMINE
2008
219views more  DATAMINE 2008»
15 years 3 months ago
Correlating burst events on streaming stock market data
Abstract We address the problem of monitoring and identification of correlated burst patterns in multi-stream time series databases. We follow a two-step methodology: first we iden...
Michail Vlachos, Kun-Lung Wu, Shyh-Kwei Chen, Phil...
CCR
2006
115views more  CCR 2006»
15 years 3 months ago
Network coding: an instant primer
Network coding is a new research area that may have interesting applications in practical networking systems. With network coding, intermediate nodes may send out packets that are...
Christina Fragouli, Jean-Yves Le Boudec, Jörg...
CN
2006
82views more  CN 2006»
15 years 3 months ago
Event-condition-action rules on RDF metadata in P2P environments
RDF is one of the technologies proposed to realise the vision of the Semantic Web and it is being increasingly used in distributed web-based applications. The use of RDF in applic...
George Papamarkos, Alexandra Poulovassilis, Peter ...
CN
2006
66views more  CN 2006»
15 years 3 months ago
Secure acknowledgment aggregation and multisignatures with limited robustness
In certain reliable group-oriented and multicast applications, a source needs to securely verify whether all (and if not all, which) intended receivers have received a message. How...
Claude Castelluccia, Stanislaw Jarecki, Jihye Kim,...
« Prev « First page 2306 / 2513 Last » Next »