Sciweavers

357 search results - page 30 / 72
» On Reversibility and Determinism in P Systems
Sort
View
ACNS
2007
Springer
172views Cryptology» more  ACNS 2007»
14 years 2 months ago
Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack
In the RSA system, balanced modulus N denotes a product of two large prime numbers p and q, where q < p < 2q. Since IntegerFactorization is difficult, p and q are simply esti...
Hung-Min Sun, Mu-En Wu, Yao-Hsin Chen
P2P
2009
IEEE
167views Communications» more  P2P 2009»
14 years 3 months ago
ID Repetition in Kad
ID uniqueness is essential in DHT-based systems as peer lookup and resource searching rely on IDmatching. Many previous works and measurements on Kad do not take into account that...
Jie Yu, Chengfang Fang, Jia Xu, Ee-Chien Chang, Zh...
ICPADS
2008
IEEE
14 years 2 months ago
Delaunay State Management for Large-Scale Networked Virtual Environments
Peer-to-Peer (P2P) networks have been proposed as a promising approach to create more scalable Networked Virtual Environment (NVE) systems, but P2P-NVE also increases the probabil...
Chien-Hao Chien, Shun-Yun Hu, Jehn-Ruey Jiang
WWW
2005
ACM
14 years 9 months ago
Signing individual fragments of an RDF graph
Being able to determine the provenience of statements is a fundamental step in any SW trust modeling. We propose a methodology that allows signing of small groups of RDF statement...
Giovanni Tummarello, Christian Morbidoni, Paolo Pu...
DC
2008
13 years 8 months ago
The weakest failure detectors to boost obstruction-freedom
This paper determines necessary and sufficient conditions to implement wait-free and non-blocking contention managers in a shared memory system. The necessary conditions hold even...
Rachid Guerraoui, Michal Kapalka, Petr Kouznetsov