Sciweavers

5687 search results - page 25 / 1138
» Visualizing Evaluation in Scheme
Sort
View
IJNSEC
2011
77views more  IJNSEC 2011»
14 years 6 months ago
Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme ca...
Hussein Al-Bahadili, Shakir Hussain, Ghassan Issa,...
DSN
2008
IEEE
15 years 6 months ago
Integration and evaluation of Multi-Instance-Precommit schemes within postgreSQL
Multi-Instance-Precommit (MIP) has been recently presented as an innovative transaction management scheme in support of reliability for Atomic Transactions in multitier (e.g. Web-...
Paolo Romano, Francesco Quaglia
ICCCN
2007
IEEE
15 years 5 months ago
A Performance Evaluation of Vertical Handoff Scheme between Mobile-WiMax and Cellular Networks
- In multi-access network environments, interworking technologies has become a very important issue these days. This interworking would deliver optimized services to users and also...
SeongSoo Park, Jaehwang Yu, JongTae Ihm
TELSYS
2002
100views more  TELSYS 2002»
14 years 11 months ago
An Efficient Rerouting Scheme for MPLS-Based Recovery and Its Performance Evaluation
The path recovery in MPLS is the technique to reroute traffic around a failure or congestion in a LSP. Currently, there are two kinds of model for path recovery: rerouting and prot...
Gaeil Ahn, Jongsoo Jang, Woojik Chun
AVI
2006
15 years 26 days ago
Design and evaluation of a shoulder-surfing resistant graphical password scheme
When users input their passwords in a public place, they may be at risk of attackers stealing their password. An attacker can capture a password by direct observation or by record...
Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, Je...