Sciweavers

828 search results - page 117 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
97
Voted
ICCSA
2003
Springer
15 years 7 months ago
Parallel CLUSTAL W for PC Clusters
This paper presents a parallel version of CLUSTAL W, called pCLUSTAL. In contrast to the commercial SGI parallel Clustal, which requires an expensive shared memory SGI multiprocess...
James Cheetham, Frank K. H. A. Dehne, Sylvain Pitr...
114
Voted
ECIS
2000
15 years 4 months ago
Open Source Movements as a Model for Organizing
Open source software such as the operating system Linux has in a few years created much attention as an alternative way to develop and distribute software. Open source is to let an...
Jan Ljungberg
CORR
2008
Springer
137views Education» more  CORR 2008»
15 years 2 months ago
Design and Implementation Aspects of a novel Java P2P Simulator with GUI
Peer-to-peer networks consist of thousands or millions of nodes that might join and leave arbitrarily. The evaluation of new protocols in real environments is many times practical...
Vassilios Chrissikopoulos, George Papaloukopoulos,...
126
Voted
AAAI
2004
15 years 4 months ago
Regrets Only! Online Stochastic Optimization under Time Constraints
This paper considers online stochastic optimization problems where time constraints severely limit the number of offline optimizations which can be performed at decision time and/...
Russell Bent, Pascal Van Hentenryck
117
Voted
EDOC
2004
IEEE
15 years 6 months ago
Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems
As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. T...
Nobukazu Yoshioka, Shinichi Honiden, Anthony Finke...