Sciweavers

2057 search results - page 126 / 412
» Distributed Secure Systems: Then and Now
Sort
View
ITEE
2007
15 years 5 months ago
Distributed Power Generation: Requirements and Recommendations for an ICT Architecture
: Contemporary power distribution faces various new challenges. Most of those challenges have a strong impact on the ICT-structure required and on system architecture. This contrib...
Ludger Winkels, Jan-Patrick Osterloh, Fabian Gr&uu...
ISER
1995
Springer
100views Robotics» more  ISER 1995»
15 years 8 months ago
Distributed Robotic Manipulation: Experiments in Minimalism
Minimalism pursues the following agenda: For a given robotics task, nd the minimal con guration of resources required to solve the task. Thus, minimalism attempts to reduce the re...
Karl-Friedrich Böhringer, Russell Brown, Bruc...
OSDI
2002
ACM
16 years 4 months ago
Secure Routing for Structured Peer-to-Peer Overlay Networks
Structured peer-to-peer overlay networks provide a substrate for the construction of large-scale, decentralized applications, including distributed storage, group communication, a...
Miguel Castro, Peter Druschel, Ayalvadi J. Ganesh,...
TIFS
2008
109views more  TIFS 2008»
15 years 4 months ago
Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks
Today, mass-scale electronic content distribution systems embed forensic tracking watermarks primarily at the distribution server. For limiting the bandwidth usage and server compl...
Mehmet Utku Celik, Aweke N. Lemma, Stefan Katzenbe...
ECAI
2004
Springer
15 years 9 months ago
Inference Attacks in Peer-to-Peer Homogeneous Distributed Data Mining
Spontaneous formation of peer-to-peer agent-based data mining systems seems a plausible scenario in years to come. However, the emergence of peer-to-peer environments further exace...
Josenildo Costa da Silva, Matthias Klusch, Stefano...