Sciweavers

51 search results - page 6 / 11
» Signcryption and Its Applications in Efficient Public Key So...
Sort
View
BMCBI
2005
161views more  BMCBI 2005»
14 years 9 months ago
Non-linear mapping for exploratory data analysis in functional genomics
Background: Several supervised and unsupervised learning tools are available to classify functional genomics data. However, relatively less attention has been given to exploratory...
Francisco Azuaje, Haiying Wang, Alban Chesneau
CCS
2009
ACM
15 years 10 months ago
PBES: a policy based encryption system with application to data sharing in the power grid
In distributed systems users need the ability to share sensitive content with multiple other recipients based on their ability to satisfy arbitrary policies. One such system is el...
Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki,...
HPCC
2007
Springer
15 years 3 months ago
A Fast Disaster Recovery Mechanism for Volume Replication Systems
Disaster recovery solutions have gained popularity in the past few years because of their ability to tolerate disasters and to achieve the reliability and availability. Data replic...
Yanlong Wang, Zhanhuai Li, Wei Lin
CN
2006
85views more  CN 2006»
14 years 9 months ago
A scalable and decentralized fast-rerouting scheme with efficient bandwidth sharing
This paper focuses on the protection of virtual circuits (Label Switched Paths, LSPs) in a (G)MPLS (Generalised Multi-Protocol Label Switching) network. The proposed algorithm is ...
Simon Balon, Laurent Mélon, Guy Leduc
MASS
2010
156views Communications» more  MASS 2010»
14 years 7 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov