Sciweavers

1116 search results - page 189 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
JCP
2007
143views more  JCP 2007»
13 years 7 months ago
Alternatives for In-Service BER Estimation in All-Optical Networks: Towards Minimum Intrusion
— Combining the existing approaches for optical intelligence and the speed and capacity of light is undoubtedly the only viable strategy for building future-proof, highspeed netw...
Carolina Pinart
DC
1999
13 years 7 months ago
A Simple and Fast Asynchronous Consensus Protocol Based on a Weak Failure Detector
or fault-tolerant asynchronous systems. It abstracts a family of problems known as Agreement (or Coordination) problems. Any solution to consensus can serve as a basic building blo...
Michel Hurfin, Michel Raynal
JCC
2011
87views more  JCC 2011»
13 years 2 months ago
Determining equilibrium constants for dimerization reactions from molecular dynamics simulations
Abstract: With today’s available computer power, free energy calculations from equilibrium molecular dynamics simulations “via counting” become feasible for an increasing num...
Djurre H. De Jong, Lars V. Schäfer, Alex H. D...
JSS
2011
103views more  JSS 2011»
12 years 10 months ago
XML-manipulating test case prioritization for XML-manipulating services
: A web service may evolve autonomously, making peer web services in the same service composition uncertain as to whether the evolved behaviors are compatible with its original col...
Lijun Mei, W. K. Chan, T. H. Tse, Robert G. Merkel
AISS
2010
131views more  AISS 2010»
13 years 5 months ago
LWSDM: Layered Web Service Discovery Mechanism
The boom of Service oriented architecture is on substantial rise. SOA developers orchestrate individual SOA objects into web services. It has been a dream of software engineers to...
Shrabani Mallick, D. S. Kushwaha