Sciweavers

790 search results - page 36 / 158
» Designated Confirmer Signatures
Sort
View
ISSA
2004
13 years 9 months ago
Security Considerations In A Global Message Service Handler Design
: Web services are generally accepted as the most interoperable application interface today on the Web. In the context of a global electronic marketplace this is an essential facto...
Johannes J. van Eeden
OPODIS
2010
13 years 5 months ago
Signature-Free Broadcast-Based Intrusion Tolerance: Never Decide a Byzantine Value
: Provide application processes with strong agreement guarantees despite failures is a fundamental problem of fault-tolerant distributed computing. Correct processes have not to be...
Achour Mostéfaoui, Michel Raynal
WSC
1997
13 years 9 months ago
Pallet Optimization and Throughput Estimation via Simulation
We describe a discrete-process simulation analysis of a production system at an automotive supply company. This simulation project was undertaken with the goals of demonstrating a...
Edward J. Williams, Andrew Gevaert
SQJ
2010
112views more  SQJ 2010»
13 years 2 months ago
Improving design-pattern identification: a new approach and an exploratory study
The identification of occurrences of design patterns in programs can help maintainers to understand the program design and implementation. It can also help them to make informed ch...
Yann-Gaël Guéhéneuc, Jean-Yves ...
ISCA
2006
IEEE
142views Hardware» more  ISCA 2006»
14 years 1 months ago
Bulk Disambiguation of Speculative Threads in Multiprocessors
Transactional Memory (TM), Thread-Level Speculation (TLS), and Checkpointed multiprocessors are three popular architectural techniques based on the execution of multiple, cooperat...
Luis Ceze, James Tuck, Josep Torrellas, Calin Casc...