Sciweavers

2421 search results - page 388 / 485
» Message from the Co-Chairs
Sort
View
ACNS
2007
Springer
165views Cryptology» more  ACNS 2007»
14 years 3 months ago
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
We present two transforms to acquire chosen ciphertext security from tag based techniques. The first one requires the separability of underlying primitives. By separability, info...
Rui Zhang 0002
EUROPAR
2007
Springer
14 years 3 months ago
Esodyp+: Prefetching in the Jackal Software DSM
Abstract. Prefetching transfers a data item in advance from its storage location to its usage location so that communication is hidden and does not delay computation. We present a ...
Michael Klemm, Jean Christophe Beyler, Ronny T. La...
LADS
2007
Springer
14 years 3 months ago
Adjusting a Knowledge-Based Algorithm for Multi-agent Communication for CPS
Abstract. Using a knowledge-based approach we adjust a knowledgebased algorithm for multi-agent communication for the process of cooperative problem solving (CPS). The knowledge-ba...
Egon van Baars, Rineke Verbrugge
MIDDLEWARE
2007
Springer
14 years 3 months ago
A Policy Management Framework for Content-Based Publish/Subscribe Middleware
Abstract. Content-based Publish/Subscribe (CPS) is a powerful paradigm providing loosely-coupled, event-driven messaging services. Although the general CPS model is well-known, man...
Alex Wun, Hans-Arno Jacobsen
SSS
2007
Springer
14 years 3 months ago
Stabilization of Loop-Free Redundant Routing
Consider a network of processes that exchange messages via FIFO communication channels. Each process chooses a subset of its neighboring processes to be its successors. Furthermore...
Jorge Arturo Cobb