Sciweavers

805 search results - page 59 / 161
» Modeling and Analyzing Periodic Distributed Computations
Sort
View
NSPW
2006
ACM
14 years 3 months ago
Sanitization models and their limitations
This work explores issues of computational disclosure control. We examine assumptions in the foundations of traditional problem statements and abstract models. We offer a comprehe...
Rick Crawford, Matt Bishop, Bhume Bhumiratana, Lis...
INFOCOM
2006
IEEE
14 years 3 months ago
Proportional Replication in Peer-to-Peer Networks
— We recently showed for peer-to-peer networks, that having the number of replicas of each object proportional to the request rate for these objects has many per-node advantages....
Saurabh Tewari, Leonard Kleinrock
CORR
2010
Springer
225views Education» more  CORR 2010»
13 years 8 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
ICDCS
2006
IEEE
14 years 3 months ago
Robust Accounting in Decentralized P2P Storage Systems
A peer-to-peer (P2P) storage system allows a network of peer computers to increase the availability of their data by replicating it on other peers in the network. In such networks...
Ivan Osipkov, Peng Wang, Nicholas Hopper
OR
2010
Springer
13 years 7 months ago
Modeling organic carbon and carbon-mediated soil processes in DSSAT v4.5
Cropping systems models have evolved over the last four decades in response to the demand for modeling to address more complex questions, including issues on sustainable productio...
Cheryl H. Porter, J. W. Jones, S. Adiku, A. J. Gij...