Sciweavers

5488 search results - page 1013 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
ESAS
2007
Springer
15 years 10 months ago
New Strategies for Revocation in Ad-Hoc Networks
Responding to misbehavior in ad-hoc and sensor networks is difficult. We propose new techniques for deciding when to remove nodes in a decentralized manner. Rather than blackballin...
Tyler Moore, Jolyon Clulow, Shishir Nagaraja, Ross...
GRID
2007
Springer
15 years 10 months ago
Dynamic, context-aware, least-privilege grid delegation
— Performing delegation in large scale, dynamic and distributed environments with large numbers of shared resources is more challenging than inside local administrative domains. ...
Mehran Ahsant, Jim Basney, S. Lennart Johnsson
KESAMSTA
2007
Springer
15 years 10 months ago
Mobile Collaboration Framework for u-Healthcare Agent Services and Its Application Using PDAs
In this paper, we suggested a mobile collaboration framework based on distributed object group framework (DOGF). This paper focuses on the use of this framework to support mobile c...
Chang-Won Jeong, Dong-Ho Kim, Su-Chong Joo
OOPSLA
2007
Springer
15 years 10 months ago
Software speculative multithreading for Java
We apply speculative multithreading to sequential Java programs in software to achieve speedup on existing multiprocessors. A common speculation library supports both Java bytecod...
Christopher J. F. Pickett
PAKDD
2007
ACM
140views Data Mining» more  PAKDD 2007»
15 years 10 months ago
A Hybrid Multi-group Privacy-Preserving Approach for Building Decision Trees
In this paper, we study the privacy-preserving decision tree building problem on vertically partitioned data. We made two contributions. First, we propose a novel hybrid approach, ...
Zhouxuan Teng, Wenliang Du
« Prev « First page 1013 / 1098 Last » Next »