Sciweavers

1067 search results - page 185 / 214
» An Autonomic Context Management System for Pervasive Computi...
Sort
View
IACR
2011
129views more  IACR 2011»
12 years 8 months ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter
SIN
2010
ACM
13 years 6 months ago
A calculus for the qualitative risk assessment of policy override authorization
Policy override is gaining traction in the research community to improve the efficiency and usability of authorization mechanisms. These mechanisms turn the conventional privilege...
Steffen Bartsch
ICS
2009
Tsinghua U.
13 years 6 months ago
Refereeing conflicts in hardware transactional memory
In the search for high performance, most transactional memory (TM) systems execute atomic blocks concurrently and must thus be prepared for data conflicts. The TM system must then...
Arrvindh Shriraman, Sandhya Dwarkadas
VRML
2010
ACM
13 years 8 months ago
Remote scientific visualization of progressive 3D meshes with X3D
This paper presents a framework, integrated into the X3D file format, for the streaming of 3D content in the context of remote scientific visualization; a progressive mesh compres...
Adrien Maglo, Ho Lee, Guillaume Lavoué, Chr...
CCR
2004
116views more  CCR 2004»
13 years 8 months ago
An empirical study of "bogon" route advertisements
An important factor in the robustness of the interdomain routing system is whether the routers in autonomous systems (ASes) filter routes for "bogon" address space--i.e....
Nick Feamster, Jaeyeon Jung, Hari Balakrishnan