Sciweavers

1874 search results - page 263 / 375
» Network optimization for DHT-based applications
Sort
View
EUROPKI
2006
Springer
15 years 7 months ago
Pseudonymous PKI for Ubiquitous Computing
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applicat...
Ke Zeng
156
Voted
IWMMDBMS
1998
139views more  IWMMDBMS 1998»
15 years 5 months ago
Fusion of Multimedia Information
: In recent years the fusion of multimedia information from multiple real-time sources and databases has become increasingly important because of its practical significance in many...
Shi-Kuo Chang, Taieb Znati
137
Voted
LCN
2005
IEEE
15 years 9 months ago
AntiWorm NPU-based Parallel Bloom Filters for TCP/IP Content Processing in Giga-Ethernet LAN
—TCP/IP protocol suite carries most application data in Internet. TCP flow retrieval has more security meanings than the IP packet payload. Hence, monitoring the TCP flow has mor...
Zhen Chen, Chuang Lin, Jia Ni, Dong-Hua Ruan, Bo Z...
134
Voted
KIVS
2005
Springer
15 years 9 months ago
From Location to Position Management: User Tracking for Location-based Services
: This paper compares traditional location management, which focuses on tracking mobile subscribers in the topology of a cellular network, with position management, which we defin...
Axel Küpper, Georg Treu
GECCO
2004
Springer
106views Optimization» more  GECCO 2004»
15 years 9 months ago
Evolving En-Route Caching Strategies for the Internet
Nowadays, large distributed databases are commonplace. Client applications increasingly rely on accessing objects from multiple remote hosts. The Internet itself is a huge network ...
Jürgen Branke, Pablo Funes, Frederik Thiele