Sciweavers

620 search results - page 106 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
COMCOM
2002
105views more  COMCOM 2002»
14 years 9 months ago
An intensive survey of fair non-repudiation protocols
With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Nonrepudiation services m...
Steve Kremer, Olivier Markowitch, Jianying Zhou
IJWIN
2002
154views more  IJWIN 2002»
14 years 9 months ago
Connection Admission Control for PCS-to-Internet Protocol Internetworking
This paper studies the connection admission control for PCS-to-Internet protocol internetworking. In order to provide QoS to the Internet and avoid scalability problems, several re...
Fei Yu, Victor C. M. Leung
TMM
2002
104views more  TMM 2002»
14 years 9 months ago
Spatial contextual classification and prediction models for mining geospatial data
Modeling spatial context (e.g., autocorrelation) is a key challenge in classification problems that arise in geospatial domains. Markov random fields (MRF) is a popular model for i...
Shashi Shekhar, Paul R. Schrater, Ranga Raju Vatsa...
JCB
2008
111views more  JCB 2008»
14 years 9 months ago
Sorting Genomes with Centromeres by Translocations
A centromere is a special region in the chromosome that plays a vital role during cell division. Every new chromosome created by a genome rearrangement event must have a centromer...
Michal Ozery-Flato, Ron Shamir
PE
2007
Springer
140views Optimization» more  PE 2007»
14 years 9 months ago
Stochastic analysis of file-swarming systems
File swarming (or file sharing) is one of the most important applications in P2P networks. In this paper, we propose a stochastic framework to analyze a file swarming system und...
Minghong Lin, Bin Fan, John C. S. Lui, Dah-Ming Ch...