Sciweavers

1136 search results - page 172 / 228
» Functional Validation in Grid Computing
Sort
View
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
14 years 3 months ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...
SAC
2005
ACM
14 years 3 months ago
Formal modeling and quantitative analysis of KLAIM-based mobile systems
KLAIM is an experimental language designed for modeling and programming distributed systems composed of mobile components where distribution awareness and dynamic system architect...
Rocco De Nicola, Diego Latella, Mieke Massink
CHI
2004
ACM
14 years 3 months ago
Text analysis as a tool for analyzing conversation in online support groups
In this paper we describe a software tool that allows investigators to make comparisons across different online forums and media by analyzing word counts in userspecified categori...
Adam D. I. Kramer, Susan R. Fussell, Leslie D. Set...
ISW
2004
Springer
14 years 3 months ago
Chameleon Hashing Without Key Exposure
Abstract. Chameleon signatures are based on well established hashand-sign paradigm, where a chameleon hash function is used to compute the cryptographic message digest. Chameleon s...
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
NOSSDAV
2004
Springer
14 years 3 months ago
Connectivity restrictions in overlay multicast
A large number of overlay multicast protocols have been developed, almost all of which assume universal connectivity between end hosts. However, in reality, this assumption is not...
Aditya Ganjam, Hui Zhang