Sciweavers

297 search results - page 47 / 60
» chi 2004
Sort
View
NETWORKING
2004
15 years 1 days ago
Network-Embedded Programmable Storage and Its Applications
We consider the utility of two key properties of network-embedded storage: programmability and network-awareness. We describe two extensive applications, whose performance and fun...
Sumeet Sobti, Junwen Lai, Yilei Shao, Nitin Garg, ...
SERP
2004
15 years 22 hour ago
Modeling Aspects of the Dynasty 3-D Game
This paper presents the motivation as well as the development for Dynasty, a 3-D game. Dynasty is a multiplayer 3D first person shooter game that is based in Ancient China. Player...
Frederick C. Harris Jr., Brent Devaney, John Kenyo...
78
Voted
DSS
2006
91views more  DSS 2006»
14 years 10 months ago
Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach
Organizations are making substantial investments in information security to reduce the risk presented by vulnerabilities in their information technology (IT) infrastructure. Howev...
Mukul Gupta, Jackie Rees, Alok R. Chaturvedi, Jie ...
IJNSEC
2007
130views more  IJNSEC 2007»
14 years 10 months ago
An Attack on Libert et al.' s ID-based Undeniable Signature Scheme
In 2004, Libert and Quisquater proposed an identity based undeniable signature scheme using pairings over elliptic curves. In this article, we show that the scheme is not secure. ...
Zichen Li, C. F. Chong, Lucas Chi Kwong Hui, Siu-M...
COMCOM
2004
98views more  COMCOM 2004»
14 years 10 months ago
Proactive resource provisioning
Allocating resources in networks to QoS flows may require undesirable delays or costs. We consider a dynamic Service Level Agreement (SLA) negotiation scheme between peer autonomo...
Eric Chi, Michael Fu, Jean C. Walrand