Sciweavers

14824 search results - page 2560 / 2965
» Security - Introduction
Sort
View
NDSS
2006
IEEE
15 years 9 months ago
Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorit
Volunteer distributed computations utilize spare processor cycles of personal computers that are connected to the Internet. The resulting platforms provide computational power pre...
Doug Szajda, Michael Pohl, Jason Owen, Barry G. La...
NOMS
2006
IEEE
156views Communications» more  NOMS 2006»
15 years 9 months ago
An Integrated Solution to Protect Link State Routing against Faulty Intermediate Routers
— The importance of the routers in the network and the vulnerability in the nature of the link state routing protocol highlight the necessity of effective routing protection agai...
He Huang, Shyhtsun Felix Wu
SRDS
2006
IEEE
15 years 9 months ago
Topology Sensitive Replica Selection
As the disks typically found in personal computers grow larger, protecting data by replicating it on a collection of “peer” systems rather than on dedicated high performance s...
Dmitry Brodsky, Michael J. Feeley, Norman C. Hutch...
VTC
2006
IEEE
107views Communications» more  VTC 2006»
15 years 9 months ago
Architecture of an Always Best Connected Vehicular Communication Gateway
Abstract— MobilitY and CollAboRative Work in European Vehicle Emergency NeTworks (MYCAREVENT) is an European Project of the 6th Framework Program [1], and aims to optimize the Eu...
Erik Weiss, M. Muehleisen, Carl-Herbert Rokitansky...
VTC
2006
IEEE
102views Communications» more  VTC 2006»
15 years 9 months ago
A Fast Handoff Mechanism for IEEE 802.11 and IAPP Networks
Handoff is a critical issue in IEEE 802.11-based wireless networks. In this paper we propose a fast and seamless handoff solution for IEEE 802.11 wireless LAN with IAPP. It is base...
Ping-Jung Huang, Yu-Chee Tseng, Kun-Cheng Tsai
« Prev « First page 2560 / 2965 Last » Next »