Sciweavers

2035 search results - page 212 / 407
» Communicating Scala Objects
Sort
View

Publication
293views
14 years 3 months ago
Providing a Cloud Network Infrastructure on a Supercomputer
Supercomputers and clouds both strive to make a large number of computing cores available for computation. More recently, similar objectives such as low-power, manageability at sc...
J. Appavoo, V. Uhlig, A. Waterland, B. Rosenburg, ...
PKDD
2007
Springer
214views Data Mining» more  PKDD 2007»
14 years 3 months ago
Multi-party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework
Abstract. Analysis of privacy-sensitive data in a multi-party environment often assumes that the parties are well-behaved and they abide by the protocols. Parties compute whatever ...
Hillol Kargupta, Kamalika Das, Kun Liu
SAFECOMP
2007
Springer
14 years 3 months ago
Improving Test Coverage for UML State Machines Using Transition Instrumentation
We discuss the problem of generating test suites from UML state machines and present a method to extend the capabilities of existing automated test case generators. Current tools p...
Mario Friske, Bernd-Holger Schlingloff
ASWEC
2006
IEEE
14 years 3 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge
GLOBECOM
2006
IEEE
14 years 3 months ago
A Lightweight Secure Solution for RFID
— Radio Frequency Identification (RFID) systems have provided promising solutions to effective identification of a large number of tagged objects. However, RFID systems suffer ...
Bo Sun, Chung-Chih Li, Yang Xiao