Sciweavers

5592 search results - page 1019 / 1119
» On Random Betweenness Constraints
Sort
View
143
Voted
VLDB
2004
ACM
120views Database» more  VLDB 2004»
15 years 10 months ago
Relational link-based ranking
Link analysis methods show that the interconnections between web pages have lots of valuable information. The link analysis methods are, however, inherently oriented towards analy...
Floris Geerts, Heikki Mannila, Evimaria Terzi
WAC
2004
Springer
149views Communications» more  WAC 2004»
15 years 10 months ago
BIONETS: BIO-inspired NExt generaTion networkS
The amount of information in the new emerging all-embracing pervasive environments will be enormous. Current Internet protocol conceived almost forty years ago, were never planned ...
Iacopo Carreras, Imrich Chlamtac, Hagen Woesner, C...
CCGRID
2003
IEEE
15 years 10 months ago
Creating Services with Hard Guarantees from Cycle-Harvesting Systems
Abstract— Cycle-harvesting software on commodity computers is available from a number of companies and a significant part of the Grid computing landscape. However, creating comm...
Chris Kenyon, Giorgos Cheliotis
NDSS
2003
IEEE
15 years 9 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the server...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
SPAA
2003
ACM
15 years 9 months ago
A practical algorithm for constructing oblivious routing schemes
In a (randomized) oblivious routing scheme the path chosen for a request between a source s and a target t is independent from the current traffic in the network. Hence, such a sc...
Marcin Bienkowski, Miroslaw Korzeniowski, Harald R...
« Prev « First page 1019 / 1119 Last » Next »