Sciweavers

7839 search results - page 1479 / 1568
» What's there and what's not
Sort
View
CORR
2010
Springer
84views Education» more  CORR 2010»
15 years 27 days ago
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Line...
Mohammad Reza Sohizadeh Abyaneh
105
Voted
CORR
2010
Springer
108views Education» more  CORR 2010»
15 years 27 days ago
Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characteriz
The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these proto...
Danilo Valeros Bernardo, Doan B. Hoang
CORR
2010
Springer
85views Education» more  CORR 2010»
15 years 27 days ago
Pushing BitTorrent Locality to the Limit
Peer-to-peer (P2P) locality has recently raised a lot of interest in the community. Indeed, whereas P2P content distribution enables financial savings for the content providers, i...
Stevens Le-Blond, Arnaud Legout, Walid Dabbous
134
Voted
CORR
2008
Springer
176views Education» more  CORR 2008»
15 years 27 days ago
Analysis of Social Voting Patterns on Digg
The social Web is transforming the way information is created and distributed. Authoring tools, e.g., blog publishing services, enable users to quickly and easily publish content,...
Kristina Lerman, Aram Galstyan
134
Voted
CORR
2008
Springer
116views Education» more  CORR 2008»
15 years 27 days ago
Binding bigraphs as symmetric monoidal closed theories
Milner's bigraphs [1] are a general framework for reasoning about distributed and concurrent programming languages. Notably, it has been designed to encompass both the -calcul...
Tom Hirschowitz, Aurélien Pardon
« Prev « First page 1479 / 1568 Last » Next »