Sciweavers

1032 search results - page 168 / 207
» Implementing a Register in a Dynamic Distributed System
Sort
View
PODC
2003
ACM
14 years 2 months ago
Scalable public-key tracing and revoking
Traitor Tracing Schemes constitute a very useful tool against piracy in the context of digital content broadcast. In such multi-recipient encryption schemes, each decryption key is...
Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti...
OOPSLA
2009
Springer
14 years 3 months ago
Thorn: robust, concurrent, extensible scripting on the JVM
Scripting languages enjoy great popularity due their support for rapid and exploratory development. They typically have lightweight syntax, weak data privacy, dynamic typing, powe...
Bard Bloom, John Field, Nathaniel Nystrom, Johan &...
HICSS
2008
IEEE
129views Biometrics» more  HICSS 2008»
14 years 3 months ago
Integration Testing of Composite Applications
A service-oriented architecture enables composite applications that support business processes to be defined and built dynamically from loosely coupled and interoperable web servi...
Liam Peyton, Bernard Stepien, Pierre Seguin
MDM
2007
Springer
137views Communications» more  MDM 2007»
14 years 3 months ago
Infrastructure for Data Processing in Large-Scale Interconnected Sensor Networks
Abstract—With the price of wireless sensor technologies diminishing rapidly we can expect large numbers of autonomous sensor networks being deployed in the near future. These sen...
Karl Aberer, Manfred Hauswirth, Ali Salehi
ACSAC
2005
IEEE
14 years 2 months ago
Exploiting Independent State For Network Intrusion Detection
Network intrusion detection systems (NIDSs) critically rely on processing a great deal of state. Often much of this state resides solely in the volatile processor memory accessibl...
Robin Sommer, Vern Paxson