Sciweavers

17951 search results - page 3457 / 3591
» Network Coding Applications
Sort
View
JUCS
2008
113views more  JUCS 2008»
14 years 10 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
JUCS
2008
149views more  JUCS 2008»
14 years 10 months ago
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension
: In a secure roaming scenario, a user U travels to a foreign network and communicates with a foreign server V securely so that no one other than U and V can obtain the messages ex...
Guomin Yang, Duncan S. Wong, Xiaotie Deng
JIIS
2006
113views more  JIIS 2006»
14 years 10 months ago
Spatial ordering and encoding for geographic data mining and visualization
: Geographic information (e.g., locations, networks, and nearest neighbors) are unique and different from other aspatial attributes (e.g., population, sales, or income). It is a ch...
Diansheng Guo, Mark Gahegan
EOR
2007
108views more  EOR 2007»
14 years 10 months ago
Measuring retail company performance using credit scoring techniques
This paper proposes a theoretical framework for predicting financial distress based on Hunt’s (2000) Resource-Advantage Theory of Competition. The study focuses on the US retail...
Yu-Chiang Hu, Jake Ansell
MMS
2006
14 years 10 months ago
Adaptive receiver-driven streaming from multiple senders
This paper presents design and evaluation of an adaptive streaming mechanism from multiple senders to a single receiver in Peer-toPeer (P2P) networks, called P2P Adaptive Layered ...
Nazanin Magharei, Reza Rejaie
« Prev « First page 3457 / 3591 Last » Next »