Sciweavers

1063 search results - page 55 / 213
» Infrastructure Leasing Problems
Sort
View
CCS
2008
ACM
13 years 10 months ago
Identity-based encryption with efficient revocation
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminates the need for a Public Key Infrastructure (PKI). Any setting, PKI- or identit...
Alexandra Boldyreva, Vipul Goyal, Virendra Kumar
DIMVA
2009
13 years 9 months ago
A Case Study on Asprox Infection Dynamics
Abstract. The Asprox infection weaves a complex chain of dependencies involving bots that perform SQL injections on vulnerable web servers, and visitors whose machines get compromi...
Youngsang Shin, Steven A. Myers, Minaxi Gupta
AAI
2006
126views more  AAI 2006»
13 years 8 months ago
Theory and practice of field-based motion coordination in multiagent systems
Enabling and managing coordination activities between autonomous, possibly mobile, computing entities in dynamic computing scenarios challenges traditional approaches to distribut...
Marco Mamei, Franco Zambonelli
CORR
2006
Springer
121views Education» more  CORR 2006»
13 years 8 months ago
Heterogeneous Strong Computation Migration
The continuous increasing in performance requirements, for both scientic computation and industry, motivates the need of a powerful computing infrastructure. The Grid appeared as ...
Anolan Milanés, Noemi de La Rocque Rodrigue...
ENGL
2006
87views more  ENGL 2006»
13 years 8 months ago
Multiagent Web based Decision Support Systems for Global Enterprises: An Architectural Blueprint
Financial institutions are striving to maximize benefits from the emerging digital economy. However, the decision to take such an investment option is contingent upon the "pr...
Tagelsir Mohamed Gasmelseid