Sciweavers

1737 search results - page 148 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
ICDCSW
2003
IEEE
15 years 10 months ago
An Adaptive Object Allocation and Replication Algorithm in Distributed Databases
In a Distributed Database System (DDBS), transactions on objects can be read requests or write requests in a random manner. The replication algorithm of objects critically affects...
Wujuan Lin, Bharadwaj Veeravalli
MUM
2005
ACM
164views Multimedia» more  MUM 2005»
15 years 10 months ago
PhoneGuide: museum guidance supported by on-device object recognition on mobile phones
We present PhoneGuide – an enhanced museum guidance approach that uses camera-equipped mobile phones and on-device object recognition. Our main technical achievement is a simple...
Paul Föckler, Thomas Zeidler, Benjamin Bromba...
153
Voted
TITB
2008
204views more  TITB 2008»
15 years 4 months ago
A Cryptographic Approach to Securely Share and Query Genomic Sequences
To support large-scale biomedical research projects, organizations need to share person-specific genomic sequences without violating the privacy of their data subjects. In the past...
Murat Kantarcioglu, Wei Jiang, Ying Liu, Bradley M...
150
Voted
TWC
2008
127views more  TWC 2008»
15 years 4 months ago
Energy-Delay Analysis of MAC Protocols in Wireless Networks
In this paper the tradeoff between energy and delay for wireless networks is studied. A network using a request-to-send (RTS) and clear-to-send (CTS) type medium access control (M...
Shih Yu Chang, Wayne E. Stark, Achilleas Anastasop...
CCS
1998
ACM
15 years 9 months ago
A Specification of Java Loading and Bytecode Verification
This paper gives a mathematical specification the Java Virtual Machine (JVM) bytecode verifier. The specification is an axiomatic description of the verifier that makes precise su...
Allen Goldberg