Sciweavers

3731 search results - page 648 / 747
» cases 2006
Sort
View
88
Voted
JOC
2006
69views more  JOC 2006»
15 years 18 days ago
Characterization of Security Notions for Probabilistic Private-Key Encryption
The development of precise definitions of security for encryption, as well as a detailed understanding of their relationships, has been a major area of research in modern cryptogr...
Jonathan Katz, Moti Yung
82
Voted
JPDC
2006
85views more  JPDC 2006»
15 years 17 days ago
Provable algorithms for parallel generalized sweep scheduling
We present provably efficient parallel algorithms for sweep scheduling, which is a commonly used technique in Radiation Transport problems, and involves inverting an operator by i...
V. S. Anil Kumar, Madhav V. Marathe, Srinivasan Pa...
JPDC
2006
103views more  JPDC 2006»
15 years 17 days ago
Fractal: A mobile code-based framework for dynamic application protocol adaptation
The rapid growth of heterogeneous devices and diverse networks in our daily life, makes it is very difficult, if not impossible, to build a one-size-fits-all application or protoc...
Hanping Lufei, Weisong Shi
118
Voted
JPDC
2006
141views more  JPDC 2006»
15 years 17 days ago
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...
119
Voted
JSAC
2006
112views more  JSAC 2006»
15 years 17 days ago
Network Kriging
ABSTRACT. Network service providers and customers are often concerned with aggregate performance measures that span multiple network paths. Unfortunately, forming such network-wide...
David B. Chua, Eric D. Kolaczyk, Mark Crovella