Sciweavers

421 search results - page 55 / 85
» Application-Oriented Trust in Distributed Computing
Sort
View
ICDCS
2008
IEEE
14 years 2 months ago
How to Monitor for Missing RFID tags
As RFID tags become more widespread, new approaches for managing larger numbers of RFID tags will be needed. In this paper, we consider the problem of how to accurately and effic...
Chiu Chiang Tan, Bo Sheng, Qun Li
SEC
2001
13 years 10 months ago
On Securely Scheduling a Meeting
Abstract When people want to schedule a meeting, their agendas must be compared to find a time suitable for all participants. At the same time, people want to keep their agendas pr...
T. Herlea, Joris Claessens, Bart Preneel, Gregory ...
IPPS
2006
IEEE
14 years 2 months ago
Neighbourhood maps: decentralised ranking in small-world P2P networks
Reputation in P2P networks is an important tool to encourage cooperation among peers. It is based on ranking of peers according to their past behaviour. In large-scale real world ...
Matteo Dell'Amico
SKG
2006
IEEE
14 years 2 months ago
An Extended OCSP Protocol for Grid CA Cross-certification
In grid environment, there are many administrative domains, each domain has its own CA, and entities in different domains need authentication when accessing each other. The OCSP (...
Shaomin Zhang, Huitao Gong, Baoyi Wang
DEBU
2010
127views more  DEBU 2010»
13 years 5 months ago
Provenance in ORCHESTRA
Sharing structured data today requires agreeing on a standard schema, then mapping and cleaning all of the data to achieve a single queriable mediated instance. However, for setti...
Todd J. Green, Grigoris Karvounarakis, Zachary G. ...