Sciweavers

1469 search results - page 264 / 294
» Map operations and k-orbit maps
Sort
View
CTRSA
2009
Springer
128views Cryptology» more  CTRSA 2009»
14 years 4 months ago
Short Redactable Signatures Using Random Trees
Abstract. A redactable signature scheme for a string of objects supports verification even if multiple substrings are removed from the original string. It is important that the re...
Ee-Chien Chang, Chee Liang Lim, Jia Xu
ESOP
2009
Springer
14 years 4 months ago
Practical Variable-Arity Polymorphism
Just as some functions have uniform behavior over distinct types, other functions have uniform behavior over distinct arities. These variable-arity functions are widely used in scr...
T. Stephen Strickland, Sam Tobin-Hochstadt, Matthi...
GLOBECOM
2009
IEEE
14 years 4 months ago
PreDA: Predicate Routing for DTN Architectures over MANET
—We consider a Delay Tolerant Network (DTN) whose users (nodes) are connected by an underlying Mobile Ad hoc Network (MANET) substrate. Users can declaratively express high-level...
Flavio Esposito, Ibrahim Matta
IPPS
2009
IEEE
14 years 4 months ago
Using a market economy to provision compute resources across planet-wide clusters
—We present a practical, market-based solution to the resource provisioning problem in a set of heterogeneous resource clusters. We focus on provisioning rather than immediate sc...
Murray Stokely, Jim Winget, E. Keyes, C. Grimes, B...
COMPLEX
2009
Springer
14 years 4 months ago
Evolution of the Internet AS-Level Ecosystem
— We seek a simple model that describes how market forces acting on rational players result in the evolution of the multi-faceted topology of the Internet that we see today. We m...
Srinivas Shakkottai, Marina Fomenkov, Ryan Koga, D...