Sciweavers

657 search results - page 81 / 132
» Recovering architectural assumptions
Sort
View
DASFAA
2010
IEEE
189views Database» more  DASFAA 2010»
15 years 5 months ago
Peer-to-Peer Similarity Search Based on M-Tree Indexing
Similarity search in metric spaces has several important applications both in centralized and distributed environments. In centralized applications, such as similarity-based image ...
Akrivi Vlachou, Christos Doulkeridis, Yannis Kotid...
ASIACRYPT
2001
Springer
15 years 4 months ago
Provable Security of KASUMI and 3GPP Encryption Mode f8
Within the security architecture of the 3GPP system there is a standardised encryption mode f8 based on the block cipher KASUMI. In this work we examine the pseudorandomness of the...
Ju-Sung Kang, Sang Uk Shin, Dowon Hong, Okyeon Yi
ICMCS
1997
IEEE
99views Multimedia» more  ICMCS 1997»
15 years 4 months ago
A Scalable and Distributed WWW Proxy System
With the wide-spread popularity of the World-Wide Web (WWW), network and server load increases dramatically. Caching proxies have been introduced to improve the system performance...
Ka Lun Eddie Law, Biswajit Nandy, A. S. J. Chapman
ISPD
1997
ACM
103views Hardware» more  ISPD 1997»
15 years 4 months ago
On two-step routing for FPGAS
We present results which show that a separate global and detailed routing strategy can be competitive with a combined routing process. Under restricted architectural assumptions, ...
Guy G. Lemieux, Stephen Dean Brown, Daniel Vranesi...
INFOCOM
1996
IEEE
15 years 4 months ago
Network Algorithms and Protocol for Multimedia Servers
In this paper, we present a network service specifically designed for multimedia servers. It uses a histogram based traffic characterization and an overload control protocol to el...
Pawan Goyal, Harrick M. Vin