Sciweavers

9588 search results - page 1655 / 1918
» Service Value Networks
Sort
View
IJISEC
2007
87views more  IJISEC 2007»
15 years 4 months ago
Breaking four mix-related schemes based on Universal Re-encryption
Universal Re-encryption allows El-Gamal ciphertexts to be re-encrypted without knowledge of their corresponding public keys. This has made it an enticing building block for anonymo...
George Danezis
CN
2004
99views more  CN 2004»
15 years 4 months ago
Efficient peer location on the Internet
We consider the problem of locating nearby application peers over the Internet. We define a new peer-location scheme (called Tiers), that scales to large application peer groups. ...
Suman Banerjee, Christopher Kommareddy, Bobby Bhat...
CN
2004
127views more  CN 2004»
15 years 4 months ago
Intermediary infrastructures for the World Wide Web
Intermediaries are software entities, deployed on hosts of the wireline and wireless network, that mediate the interaction between clients and servers of the World Wide Web. In th...
Marios D. Dikaiakos
CLUSTER
1999
IEEE
15 years 4 months ago
Simulative performance analysis of gossip failure detection for scalable distributed systems
Three protocols for gossip-based failure detection services in large-scale heterogeneous clusters are analyzed and compared. The basic gossip protocol provides a means by which fai...
Mark W. Burns, Alan D. George, Bradley A. Wallace
PERCOM
2010
ACM
15 years 2 months ago
Crowdsourced radiomap for room-level place recognition in urban environment
Abstract—The proliferation of WLAN infrastructures has facilitated numerous indoor localization techniques using WLAN fingerprints. In particular, identifying a room or a place i...
Minkyu Lee, Hyunil Yang, Dongsoo Han, Chansu Yu
« Prev « First page 1655 / 1918 Last » Next »