Sciweavers

2139 search results - page 374 / 428
» Distributed computing and computer security education
Sort
View
FC
2007
Springer
125views Cryptology» more  FC 2007»
14 years 1 months ago
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force...
Yvo Desmedt, Tanja Lange, Mike Burmester
NDSS
2000
IEEE
14 years 3 days ago
Accountability and Control of Process Creation in Metasystems
The distinguishing feature of a metasystem is middleware that facilitates viewing a collection of large, distributed, heterogeneous resources as a single virtual machine, where ea...
Marty Humphrey, Frederick Knabe, Adam Ferrari, And...
IOR
2006
192views more  IOR 2006»
13 years 7 months ago
Exact Simulation of Stochastic Volatility and Other Affine Jump Diffusion Processes
The stochastic differential equations for affine jump diffusion models do not yield exact solutions that can be directly simulated. Discretization methods can be used for simulati...
Mark Broadie, Özgür Kaya
HPCA
2005
IEEE
14 years 8 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
ICCSA
2009
Springer
14 years 2 months ago
Towards Location-Based Real-Time Monitoring Systems in u-LBS
Recently, ubiquitous location-based services (u-LBS) has been utilized in a variety of practical and mission-critical applications such as security services, personalization servic...
MoonBae Song, Hyunseung Choo