Sciweavers

3613 search results - page 36 / 723
» Estimating costs of a service
Sort
View
73
Voted
CORR
2010
Springer
65views Education» more  CORR 2010»
15 years 17 days ago
On Unconditionally Secure Computation with Vanishing Communication Cost
We propose a novel distortion-theoretic approach to a secure three-party computation problem. Alice and Bob have deterministic sequences, and Charlie wishes to compute a normalize...
Ye Wang, Shantanu Rane, Wei Sun, Prakash Ishwar
74
Voted
ECUMN
2007
Springer
15 years 6 months ago
Multicast Extension of Unicast Charging for QoS Services
In order to successfully deploy multicast services in QoS-aware networks, pricing architectures must take into account the particular characteristics of multicast sessions. With t...
Antonio Bueno, Pere Vilà, Ramón Fabr...
97
Voted
ICMCS
2006
IEEE
117views Multimedia» more  ICMCS 2006»
15 years 6 months ago
Offering Differentiated Services in Peer-to-Peer Multimedia Multicast
In traditional overlay multicast network, all peers are treated as equal regardless of their importance and contribution to the network. In this paper, we consider that each user ...
Kan-Leung Cheng, Xing Jin, S.-H. Gary Chan

Publication
511views
16 years 10 months ago
Modeling Transit Trip Time using Archived Bus Dispatch System Data.
Transit travel time and operating speed influence service attractiveness, operating cost, and system efficiency. The objective of this paper is to estimate the values of parameters...
R. L. Bertini, A. M. El-Geneidy
102
Voted
ICSNC
2007
IEEE
15 years 6 months ago
Using the mobile phone as a security token for unified authentication
- The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentica...
Steffen Hallsteinsen, Ivar Jørstad, Do Van ...