Sciweavers

1058 search results - page 194 / 212
» Secure Group Communications Using Key Graphs
Sort
View
INFOCOM
2011
IEEE
14 years 1 months ago
Continuous multi-dimensional top-k query processing in sensor networks
—Top-k query has long been an important topic in many fields of computer science. Efficient implementation of the top-k queries is the key for information searching. With the n...
Hongbo Jiang, Jie Cheng, Dan Wang, Chonggang Wang,...
HICSS
2003
IEEE
98views Biometrics» more  HICSS 2003»
15 years 3 months ago
Effectiveness and Applicability of Internet-Based Training in the Corporation - Case of Egypt
Learning is the most indispensable activity in the current knowledge-based economy where firms, in order to compete and survive, must be constantly alert, capable of adapting to f...
Mohamed Ibrahim
CCR
2008
109views more  CCR 2008»
14 years 9 months ago
An independent H-TCP implementation under FreeBSD 7.0: description and observed behaviour
A key requirement for IETF recognition of new TCP algorithms is having an independent, interoperable implementation. This paper describes our BSD-licensed implementation of H-TCP ...
Grenville J. Armitage, Lawrence Stewart, Michael W...
HPDC
2005
IEEE
15 years 3 months ago
411 on scalable password service
In this paper we present 411, a password distribution system for high performance environments that provides security and scalability. We show that existing solutions such as NIS ...
Federico D. Sacerdoti, Mason J. Katz, Philip M. Pa...
KBSE
2003
IEEE
15 years 2 months ago
A Programmable Client-Server Model: Robust Extensibility via DSLs
The client-server model has been successfully used to support a wide variety of families of services in the context of distributed systems. However, its server-centric nature make...
Charles Consel, Laurent Réveillère