Sciweavers

403 search results - page 69 / 81
» Efficient Algorithms for Secure Multicast key Management
Sort
View
128
Voted
MOBISYS
2008
ACM
16 years 3 months ago
Improving wireless privacy with an identifier-free link layer protocol
We present the design and evaluation of an 802.11-like wireless link layer protocol that obfuscates all transmitted bits to increase privacy. This includes explicit identifiers su...
Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayos...
167
Voted
DOLAP
1999
ACM
15 years 8 months ago
Design and Selection of Materialized Views in a Data Warehousing Environment: A Case Study
In this paper, we describe the design of a data warehousing system for an engineering company ‘R’. This system aims to assist users in retrieving data for business analysis in...
Goretti K. Y. Chan, Qing Li, Ling Feng
124
Voted
VLDB
2002
ACM
98views Database» more  VLDB 2002»
15 years 3 months ago
Processing Star Queries on Hierarchically-Clustered Fact Tables
Star queries are the most prevalent kind of queries in data warehousing, OLAP and business intelligence applications. Thus, there is an imperative need for efficiently processing ...
Nikos Karayannidis, Aris Tsois, Timos K. Sellis, R...
124
Voted
ICDCS
2008
IEEE
15 years 10 months ago
Fast Path Session Creation on Network Processors
The security gateways today are required not only to block unauthorized accesses by authenticating packet headers, but also by inspecting connection states to defend against malic...
Bo Xu, Yaxuan Qi, Fei He, Zongwei Zhou, Yibo Xue, ...
122
Voted
GRID
2004
Springer
15 years 9 months ago
Self-Organizing Agents for Grid Load Balancing
A computational grid is a wide-area computing environment for cross-domain resource sharing and service integration. Resource management and load balancing are key concerns when i...
Junwei Cao