Sciweavers

18188 search results - page 3453 / 3638
» Evaluation for Collaborative Systems
Sort
View
TON
2008
155views more  TON 2008»
15 years 4 months ago
A comparative analysis of server selection in content replication networks
Server selection plays an essential role in content replication networks, such as peer-to-peer (P2P) and content delivery networks (CDNs). In this paper, we perform an analytical i...
Tao Wu, David Starobinski
TOPLAS
2008
138views more  TOPLAS 2008»
15 years 4 months ago
Decomposing bytecode verification by abstract interpretation
act Interpretation C. BERNARDESCHI, N. DE FRANCESCO, G. LETTIERI, L. MARTINI, and P. MASCI Universit`a di Pisa Bytecode verification is a key point in the security chain of the Jav...
Cinzia Bernardeschi, Nicoletta De Francesco, Giuse...
159
Voted
TPDS
2008
116views more  TPDS 2008»
15 years 4 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
JNW
2007
88views more  JNW 2007»
15 years 4 months ago
Resource Allocation Schemes in Integrated Heterogeneous Wireless and Mobile Networks
— Wireless and mobile networks have experienced a great success in the past few years. However, any single type of wireless and mobile network cannot meet all types of service re...
Wei Shen, Qing-An Zeng
TSP
2008
109views more  TSP 2008»
15 years 4 months ago
Constrained Tensor Modeling Approach to Blind Multiple-Antenna CDMA Schemes
In this paper, we consider an uplink multiple-antenna Code-Division Multiple-Access (CDMA) system linking several multiple-antenna mobile users to one multiple-antenna base-statio...
André L. F. de Almeida, Gérard Favie...
« Prev « First page 3453 / 3638 Last » Next »