Sciweavers

699 search results - page 33 / 140
» Computation of Interprocedural Control Dependence
Sort
View
CRYPTO
2006
Springer
149views Cryptology» more  CRYPTO 2006»
14 years 2 months ago
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation
In the setting of multiparty computation, a set of parties wish to jointly compute a function of their inputs, while preserving security in the case that some subset of them are co...
Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Ere...
IJNSEC
2006
156views more  IJNSEC 2006»
13 years 10 months ago
Security in Pervasive Computing: Current Status and Open Issues
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing...
Munirul M. Haque, Sheikh Iqbal Ahamed
COMPUTER
1998
131views more  COMPUTER 1998»
13 years 10 months ago
Windows NT Clustering Service
ER ABSTRACTIONS ter service uses several abstractions— including resource, resource dependencies, and resource groups—to simplify both the cluster service itself and user-visib...
Rod Gamache, Rob Short, Mike Massa
ICPP
2006
IEEE
14 years 4 months ago
Managing Risk of Inaccurate Runtime Estimates for Deadline Constrained Job Admission Control in Clusters
The advent of service-oriented Grid computing has resulted in the need for Grid resources such as clusters to enforce user-specific service needs and expectations. Service Level ...
Chee Shin Yeo, Rajkumar Buyya
SIGGRAPH
1995
ACM
14 years 1 months ago
Feature-based control of visibility error: a multi-resolution clustering algorithm for global illumination
In this paper we introduce a new approach to controlling error in hierarchical clustering algorithms for radiosity. The new method ensures that just enough work is done to meet th...
François X. Sillion, George Drettakis