Sciweavers

674 search results - page 93 / 135
» An Efficient Key Management Scheme for Pervasive Computing
Sort
View
EUROPAR
2008
Springer
13 years 9 months ago
Complementarity between Virtualization and Single System Image Technologies
Nowadays, the use of clusters in research centers or industries is undeniable. Since few years, the usage of virtual machines (VM) offers more advanced resource management capabili...
Jérôme Gallard, Geoffroy Vallé...
WMRD
1990
13 years 11 months ago
Replicated K-Resilient Objects in Arjuna
This paper describes the design of an object replication scheme for the Arjuna distributed system. ThedesignsupportsK-resiliency,where,intheabsenceofnetworkpartitions,Koutofa tota...
Mark C. Little, Santosh K. Shrivastava
ICDCSW
2008
IEEE
14 years 2 months ago
On the Modeling of Honest Players in Reputation Systems
Reputation mechanisms are a key technique to trust assessment in large-scale decentralized systems. The effectiveness of reputation-based trust management fundamentally relies on ...
Qing Zhang, Ting Yu
IACR
2011
129views more  IACR 2011»
12 years 7 months ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter
ANOR
2008
93views more  ANOR 2008»
13 years 7 months ago
Pruning in column generation for service vehicle dispatching
Abstract Column generation techniques have become a widely used technique to successfully solve large (integer) linear programs. One of the keys to obtaining a practically efficien...
Stephan Westphal, Sven Oliver Krumke