Sciweavers

2912 search results - page 495 / 583
» Overlay Networks - Implementation by Specification
Sort
View
FSE
1994
Springer
134views Cryptology» more  FSE 1994»
15 years 8 months ago
Cryptanalysis of McGuffin
This paper shows that the actual proposal for an unbalanced Feistel network by Schneier and Blaze is as vulnerable to differential cryptanalysis as the DES. 1 McGuffin Schneier and...
Vincent Rijmen, Bart Preneel
COMSWARE
2007
IEEE
15 years 8 months ago
On Configuring BGP Route Reflectors
The Border Gateway Protocol (BGP) is the standard protocol for exchanging routing information between border routers of Autonomous Systems (ASes) in today's Internet. Within a...
Yuri Breitbart, Minos N. Garofalakis, Anupam Gupta...
CONEXT
2007
ACM
15 years 8 months ago
Proactive replication in distributed storage systems using machine availability estimation
Distributed storage systems provide data availability by means of redundancy. To assure a given level of availability in case of node failures, new redundant fragments need to be ...
Alessandro Duminuco, Ernst Biersack, Taoufik En-Na...
ATMOS
2008
103views Optimization» more  ATMOS 2008»
15 years 6 months ago
IP-based Techniques for Delay Management with Priority Decisions
Delay management is an important issue in the daily operations of any railway company. The task is to update the planned timetable to a disposition timetable in such a way that the...
Michael Schachtebeck, Anita Schöbel
I3E
2008
234views Business» more  I3E 2008»
15 years 5 months ago
Development of Recommender Systems Using User Preference Tendencies: An Algorithm for Diversifying Recommendation
Abstract. Many e-commerce sites use a recommendation system to filter the specific information that a user wants out of an overload of information. Currently, the usefulness of the...
Yuki Ogawa, Hirohiko Suwa, Hitoshi Yamamoto, Isamu...