Sciweavers

620 search results - page 118 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
IDEAS
2003
IEEE
131views Database» more  IDEAS 2003»
15 years 2 months ago
Neighborhood Signatures for Searching P2P Networks
Overlay networks have received a lot of attention due to the recent wide-spread use of peer-to-peer (P2P) applications such as SETI, Napster, Gnutella, and Morpheus. Through repli...
Mei Li, Wang-Chien Lee, Anand Sivasubramaniam
DRM
2003
Springer
15 years 2 months ago
The IP war: apocalypse or revolution?
In the Foundation series, Asimov predicted a 1,000 years of darkness following the fall of the galactic empire. In the book Noir, K.W Jeter describes a world where IP is the ultim...
Tsvi Gal, Howard M. Singer, Laird Popkin
ICDE
2002
IEEE
181views Database» more  ICDE 2002»
15 years 2 months ago
YFilter: Efficient and Scalable Filtering of XML Documents
Soon, much of the data exchanged over the Internet will be encoded in XML, allowing for sophisticated filtering and content-based routing. We have built a filtering engine called ...
Yanlei Diao, Peter M. Fischer, Michael J. Franklin...
COMPSAC
2009
IEEE
15 years 2 months ago
Towards a Next-Generation Matrix Library for Java
Matrices are essential in many fields of computer science, especially when large amounts of data must be handled efficiently. Despite this demand for matrix software, we were una...
Holger Arndt, Markus Bundschus, Andreas Naegele
ICDT
1999
ACM
82views Database» more  ICDT 1999»
15 years 1 months ago
The Data Warehouse of Newsgroups
Electronic newsgroups are one of the primary means for the dissemination, exchange and sharing of information. We argue that the current newsgroup model is unsatisfactory, especial...
Himanshu Gupta, Divesh Srivastava