Sciweavers

1023 search results - page 115 / 205
» Adaptation on the Commons
Sort
View
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
15 years 5 months ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...
ECOOP
2005
Springer
15 years 10 months ago
Pitfalls in Unanticipated Dynamic Software Evolution
Abstract. The authors of this paper have all developed a framework that allows runtime adaptation of software systems. Based on our experiences, we wish to summarize common pitfall...
Peter Ebraert, Theo D'Hondt, Yves Vandewoude, Yola...
CONEXT
2007
ACM
15 years 8 months ago
Proactive replication in distributed storage systems using machine availability estimation
Distributed storage systems provide data availability by means of redundancy. To assure a given level of availability in case of node failures, new redundant fragments need to be ...
Alessandro Duminuco, Ernst Biersack, Taoufik En-Na...
IMC
2010
ACM
15 years 2 months ago
Primitives for active internet topology mapping: toward high-frequency characterization
Current large-scale topology mapping systems require multiple days to characterize the Internet due to the large amount of probing traffic they incur. The accuracy of maps from ex...
Robert Beverly, Arthur Berger, Geoffrey G. Xie
ICARCV
2008
IEEE
140views Robotics» more  ICARCV 2008»
15 years 11 months ago
Gaining colour stability in live image capturing
Digital colour cameras are dramatically falling in price, making them affordable for ubiquitous appliances in many applications. An attempt to use colour information reveals a si...
Guy K. Kloss, Napoleon H. Reyes, Martin J. Johnson...