Sciweavers

1116 search results - page 193 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
HPDC
2006
IEEE
14 years 1 months ago
Peer to peer size estimation in large and dynamic networks: A comparative study
As the size of distributed systems keeps growing, the peer to peer communication paradigm has been identified as the key to scalability. Peer to peer overlay networks are charact...
Erwan Le Merrer, Anne-Marie Kermarrec, Laurent Mas...
ICPPW
2006
IEEE
14 years 1 months ago
Parallel Implementation of the Polyhedral Homotopy Method
Homotopy methods to solve polynomial systems are well suited for parallel computing because the solution paths defined by the homotopy can be tracked independently. For sparse po...
Jan Verschelde, Yan Zhuang
UML
2004
Springer
14 years 1 months ago
SoftContract: Model-Based Design of Error-Checking Code and Property Monitors
This paper discusses a model-based design flow for requirements in distributed embedded software development. Such requirements are specified using a language similar to Linear T...
Luciano Lavagno, Marco Di Natale, Alberto Ferrari,...
STEP
2003
IEEE
14 years 29 days ago
On Analysis of Design Component Contracts: A Case Study
Software patterns are a new design paradigm used to solve problems that arise when developing software within a particular context. Patterns capture the static and dynamic structu...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan
ACSAC
2002
IEEE
14 years 20 days ago
Enforcing Resource Bound Safety for Mobile SNMP Agents
The integration of mobile agents with SNMP creates significant advantages for the management of complex networks. Nevertheless, the security concerns of mobile agent technology l...
Weijiang Yu, Aloysius K. Mok