Sciweavers

17951 search results - page 3457 / 3591
» Network Coding Applications
Sort
View
121
Voted
JUCS
2008
113views more  JUCS 2008»
15 years 2 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
122
Voted
JUCS
2008
149views more  JUCS 2008»
15 years 2 months ago
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension
: In a secure roaming scenario, a user U travels to a foreign network and communicates with a foreign server V securely so that no one other than U and V can obtain the messages ex...
Guomin Yang, Duncan S. Wong, Xiaotie Deng
JIIS
2006
113views more  JIIS 2006»
15 years 2 months ago
Spatial ordering and encoding for geographic data mining and visualization
: Geographic information (e.g., locations, networks, and nearest neighbors) are unique and different from other aspatial attributes (e.g., population, sales, or income). It is a ch...
Diansheng Guo, Mark Gahegan
EOR
2007
108views more  EOR 2007»
15 years 2 months ago
Measuring retail company performance using credit scoring techniques
This paper proposes a theoretical framework for predicting financial distress based on Hunt’s (2000) Resource-Advantage Theory of Competition. The study focuses on the US retail...
Yu-Chiang Hu, Jake Ansell
110
Voted
MMS
2006
15 years 2 months ago
Adaptive receiver-driven streaming from multiple senders
This paper presents design and evaluation of an adaptive streaming mechanism from multiple senders to a single receiver in Peer-toPeer (P2P) networks, called P2P Adaptive Layered ...
Nazanin Magharei, Reza Rejaie
« Prev « First page 3457 / 3591 Last » Next »