Sciweavers

1479 search results - page 185 / 296
» Management without (Detailed) Models
Sort
View
PODS
2005
ACM
119views Database» more  PODS 2005»
16 years 4 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
IPPS
2008
IEEE
15 years 11 months ago
DC-SIMD : Dynamic communication for SIMD processors
SIMD (single instruction multiple data)-type processors have been found very efficient in image processing applications, because their repetitive structure is able to exploit the...
Raymond Frijns, Hamed Fatemi, Bart Mesman, Henk Co...
231
Voted
P2P
2008
IEEE
15 years 11 months ago
Faster Content Access in KAD
Many different Distributed Hash Tables (DHTs) have been designed, but only few have been successfully deployed. The implementation of a DHT needs to deal with practical aspects (e...
Moritz Steiner, Damiano Carra, Ernst W. Biersack
AINA
2007
IEEE
15 years 11 months ago
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems
Abstract— Structured peer-to-peer systems have grown enormously because of their scalability, efficiency and reliability. These systems assign a unique identifier to each user ...
Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Pa...
ICDCSW
2006
IEEE
15 years 10 months ago
CoCoA: Coordinated Cooperative Localization for Mobile Multi-Robot Ad Hoc Networks
Mobile robot teams are particularly suited to applications where infrastructure is unavailable or damaged since they can be used to quickly form an infrastructure-less mobile ad h...
Dimitrios Koutsonikolas, Saumitra M. Das, Y. Charl...