Sciweavers

2200 search results - page 274 / 440
» Hop Integrity in Computer Networks
Sort
View
IPPS
2007
IEEE
15 years 10 months ago
Analyzing the Scalability of Graph Algorithms on Eldorado
The Cray MTA-2 system provides exceptional performance on a variety of sparse graph algorithms. Unfortunately, it was an extremely expensive platform. Cray is preparing an Eldorad...
Keith D. Underwood, Megan Vance, Jonathan W. Berry...
110
Voted
NDSS
2007
IEEE
15 years 10 months ago
Cryptographic Methods for Storing Ballots on a Voting Machine
A direct recording electronic (DRE) voting machine must satisfy several requirements to ensure voter privacy and the integrity of the election. A recent proposal for a vote storag...
John Bethencourt, Dan Boneh, Brent Waters
142
Voted
AINA
2007
IEEE
15 years 10 months ago
Building Web-Base SIP Analyzer with Ajax Approach
Web applications are generally less interactive than desktop applications. Due to the simple request-response model between web browsers and web servers, users usually experience ...
Quincy Wu, Yan-Hsiang Wang
133
Voted
ICDCSW
2006
IEEE
15 years 9 months ago
Contory: A Smart Phone Middleware Supporting Multiple Context Provisioning Strategies
This paper presents Contory, a middleware specifically deployed to support provisioning of context information on mobile devices such as smart phones. Contory integrates multiple...
Oriana Riva, Cristiano di Flora
142
Voted
IEEESCC
2006
IEEE
15 years 9 months ago
Modeling Non-Functional Aspects in Service Oriented Architecture
Service Oriented Architecture (SOA) is an architectural style to reuse and integrate subsystems in existing systems for designing new applications. Each application is designed in...
Hiroshi Wada, Junichi Suzuki, Katsuya Oba