Sciweavers

10301 search results - page 1920 / 2061
» informs 2007
Sort
View
100
Voted
MOBISYS
2007
ACM
16 years 12 days ago
Vehicular opportunistic communication under the microscope
We consider the problem of providing vehicular Internet access using roadside 802.11 access points. We build on previous work in this area [18, 8, 5, 11] with an extensive experim...
David Hadaller, Srinivasan Keshav, Tim Brecht, Shu...
86
Voted
DCC
2007
IEEE
16 years 11 days ago
Distributed Functional Compression through Graph Coloring
We consider the distributed computation of a function of random sources with minimal communication. Specifically, given two discrete memoryless sources, X and Y , a receiver wishe...
Devavrat Shah, Muriel Médard, Sidharth Jagg...
91
Voted
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
15 years 7 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
92
Voted
HT
2009
ACM
15 years 7 months ago
Comparing the performance of us college football teams in the web and on the field
In previous research it has been shown that link-based web page metrics can be used to predict experts’ assessment of quality. We are interested in a related question: do expert...
Martin Klein, Olena Hunsicker, Michael L. Nelson
123
Voted
ACSAC
2007
IEEE
15 years 7 months ago
Improving Signature Testing through Dynamic Data Flow Analysis
The effectiveness and precision of network-based intrusion detection signatures can be evaluated either by direct analysis of the signatures (if they are available) or by using bl...
Christopher Kruegel, Davide Balzarotti, William K....
« Prev « First page 1920 / 2061 Last » Next »