Sciweavers

464 search results - page 53 / 93
» Identity Management for Self-Portrayal
Sort
View
CORR
2006
Springer
104views Education» more  CORR 2006»
13 years 8 months ago
Unmanaged Internet Protocol: Taming the Edge Network Management Crisis
Though appropriate for core Internet infrastructure, the Internet Protocol is unsuited to routing within and between emerging ad-hoc edge networks due to its dependence on hierarc...
Bryan Ford
CLUSTER
2001
IEEE
14 years 4 days ago
NPACI Rocks: Tools and Techniques for Easily Deploying Manageable Linux Clusters
High-performance computing clusters (commodity hardware with low-latency, high-bandwidth interconnects) based on Linux, are rapidly becoming the dominant computing platform for a ...
Philip M. Papadopoulos, Mason J. Katz, Greg Bruno
CERA
2004
89views more  CERA 2004»
13 years 8 months ago
An Electronic Cash Scheme and its Management
: A secure electronic cash scheme and its role-based access control (RBAC) management are proposed in this paper. The scheme uses electronic cash for payment transactions. In this ...
Hua Wang, Yanchun Zhang, Jinli Cao
DIM
2007
ACM
14 years 13 days ago
Linkability estimation between subjects and message contents using formal concepts
In this paper, we examine how conclusions about linkability threats can be drawn by analyzing message contents and subject knowledge in arbitrary communication systems. At first, ...
Stefan Berthold, Sebastian Clauß
WSC
2004
13 years 10 months ago
Simulation of Coherent Risk Measures
In financial risk management, a coherent risk measure equals the maximum expected loss under several different probability measures, which are analogous to systems in ranking and ...
Vadim Lesnevski, Barry L. Nelson, Jeremy Staum