Sciweavers

964 search results - page 32 / 193
» On Securely Scheduling a Meeting
Sort
View
CPAIOR
2009
Springer
14 years 5 months ago
Sequencing and Counting with the multicost-regular Constraint
This paper introduces a global constraint encapsulating a regular constraint together with several cumulative costs. It is motivated in the context of personnel scheduling problems...
Julien Menana, Sophie Demassey
ICPADS
2008
IEEE
14 years 5 months ago
A Meta-scheduler with Auction Based Resource Allocation for Global Grids
As users increasingly require better quality of service from Grids, resource management and scheduling mechanisms have to evolve in order to satisfy competing demands on limited r...
Saurabh Kumar Garg, Srikumar Venugopal, Rajkumar B...
SACRYPT
1998
Springer
101views Cryptology» more  SACRYPT 1998»
14 years 3 months ago
On the Twofish Key Schedule
Twofish is a new block cipher with a 128 bit block, and a key length of 128, 192, or 256 bits, which has been submitted as an AES candidate. In this paper, we briefly review the st...
Bruce Schneier, John Kelsey, Doug Whiting, David W...
INFOCOM
2006
IEEE
14 years 5 months ago
A Secure Triple-Key Management Scheme for Wireless Sensor Networks
– Key management is critical to meet the security goals [1] to prevent the Sensor Networks being compromised by an adversary. Due to ad-hoc nature and resource limitations of sen...
Tanveer Zia, Albert Y. Zomaya
CN
1999
88views more  CN 1999»
13 years 10 months ago
Building a high-performance, programmable secure coprocessor
Secure coprocessors enable secure distributed applications by providing safe havens where an application program can Z .execute and accumulate state , free of observation and inte...
Sean W. Smith, Steve Weingart