Sciweavers

3018 search results - page 132 / 604
» Leveraging the
Sort
View
CCS
2005
ACM
14 years 3 months ago
Applications of secure electronic voting to automated privacy-preserving troubleshooting
Recent work [27, 15] introduced a novel peer-to-peer application that leverages content sharing and aggregation among the peers to diagnose misconfigurations on a desktop PC. Thi...
Qiang Huang, David Jao, Helen J. Wang
CP
2005
Springer
14 years 3 months ago
Parallel Local Search in Comet
Abstract. The availability of commodity multiprocessors offers significant opportunities for addressing the increasing computational requirements of optimization applications. To...
Laurent Michel, Pascal Van Hentenryck
EMSOFT
2005
Springer
14 years 3 months ago
Using separation of concerns for embedded systems design
systems are commonly abstracted as collections of interacting components. This perspective has lead to the insight that component behaviors can be defined separately from admissi...
Ethan K. Jackson, Janos Sztipanovits
FC
2005
Springer
80views Cryptology» more  FC 2005»
14 years 3 months ago
A User-Friendly Approach to Human Authentication of Messages
Abstract. Users are often forced to trust potentially malicious terminals when trying to interact with a remote secure system. This paper presents an approach for ensuring the inte...
Jeff King, André L. M. dos Santos
HPCC
2005
Springer
14 years 3 months ago
A Lightweight Platform for Integration of Mobile Devices into Pervasive Grids
For future generation Grids to be truly pervasive we need to allow for the integration of mobile devices, in order to leverage available resources and broaden the range of supplie...
Stavros Isaiadis, Vladimir Getov