Sciweavers

10493 search results - page 1645 / 2099
» Dynamic Word Problems
Sort
View
142
Voted
ICISC
2004
127views Cryptology» more  ICISC 2004»
15 years 5 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
153
Voted
JVM
2004
133views Education» more  JVM 2004»
15 years 5 months ago
Towards Virtual Networks for Virtual Machine Grid Computing
Virtual machines can greatly simplify wide-area discomputing by lowering the level of abstraction to the benefit of both resource providers and users. Networking, however, can be ...
Ananth I. Sundararaj, Peter A. Dinda
MASCOTS
2004
15 years 5 months ago
Reliable Response Delivery in Peer-to-Peer Systems
Unstructured peer-to-peer (P2P) system is the prevalent model in today's P2P system. In such systems, a response is sent along the same path that carried the incoming query m...
Xiaomei Liu, Yunhao Liu, Li Xiao
VG
2001
15 years 5 months ago
A Study of Transfer Function Generation for Time-Varying Volume Data
The proper usage and creation of transfer functions for time-varying data sets is an often ignored problem in volume visualization. Although methods and guidelines exist for time-i...
T. J. Jankun-Kelly, Kwan-Liu Ma
WSC
2004
15 years 5 months ago
Optimization of Traffic Signal Light Timing Using Simulation
Traffic congestion is one of the worst problems in many countries. Traffic congestion wastes a huge portion of the national income for fuel and traffic-related environmental and s...
Kasun N. Hewage, Janaka Yasantha Ruwanpura
« Prev « First page 1645 / 2099 Last » Next »