Sciweavers

1498 search results - page 30 / 300
» Network control as a distributed object application
Sort
View
CSFW
2003
IEEE
14 years 1 months ago
Type-Based Distributed Access Control
A type system is presented that combines a weak form of information flow control, termed distributed access control in the paper, with typed cryptographic operations. The motivat...
Tom Chothia, Dominic Duggan, Jan Vitek
NDSS
2005
IEEE
14 years 1 months ago
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for...
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan ...
CDC
2008
IEEE
142views Control Systems» more  CDC 2008»
14 years 2 months ago
Asynchronous distributed optimization with minimal communication
— We consider problems where multiple agents must cooperate to control their individual state so as to optimize a common objective while communicating with each other to exchange...
Minyi Zhong, Christos G. Cassandras
MM
2004
ACM
104views Multimedia» more  MM 2004»
14 years 1 months ago
Supporting continuous consistency in multiplayer online games
Multiplayer online games have become very popular in recent years. However, they generally suffer from network latency problem. If a player changes its states, it will take some ...
Frederick W. B. Li, Lewis W. F. Li, Rynson W. H. L...
TOOLS
1997
IEEE
14 years 6 days ago
Propagator: A Family of Patterns
PROPAGATOR is a family of patterns for consistently updating objects in a dependency network. The propagator patterns are found in such diverse applications as MAKE, WWW, spreadsh...
Peter H. Feiler, Walter F. Tichy