Sciweavers

1302 search results - page 222 / 261
» Fair Equivalence Relations
Sort
View
CCS
2005
ACM
14 years 2 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin
DNA
2004
Springer
132views Bioinformatics» more  DNA 2004»
14 years 2 months ago
Error Free Self-assembly Using Error Prone Tiles
DNA self-assembly is emerging as a key paradigm for nano-technology, nano-computation, and several related disciplines. In nature, DNA self-assembly is often equipped with explicit...
Ho-Lin Chen, Ashish Goel
GRID
2004
Springer
14 years 2 months ago
Hybrid Preemptive Scheduling of MPI Applications on the Grids
— Time sharing between all the users of a Grid is a major issue in cluster and Grid integration. Classical Grid architecture involves a higher level scheduler which submits non o...
Aurelien Bouteiller, Hinde-Lilia Bouziane, Thomas ...
INTELLCOMM
2004
Springer
14 years 2 months ago
About the Heterogeneity of Web Prefetching Performance Key Metrics
Web prefetching techniques have pointed to be especially important to reduce web latencies and, consequently, an important set of works can be found in the open literature. But, in...
Josep Domènech, Julio Sahuquillo, Jos&eacut...
SCAM
2003
IEEE
14 years 2 months ago
Managing Multi-Billion Dollar IT Budgets using Source Code Analysis
We present a quantitative approach for IT portfolio management. This is an approach that CMM level 1 organizations can use to obtain a corporate wide impression of the state of th...
Chris Verhoef