Sciweavers

2472 search results - page 79 / 495
» Parallel Key Exchange
Sort
View
CCS
2005
ACM
15 years 8 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin
ISPDC
2005
IEEE
15 years 8 months ago
Parallel Jess
Distributed or parallel rule-based systems are currently needed for real applications. The proposed architecture of such a system is based on a wrapper allowing the cooperation bet...
Dana Petcu
101
Voted
ICRA
2003
IEEE
88views Robotics» more  ICRA 2003»
15 years 7 months ago
A new concept of modular parallel mechanism for machining applications
The subject of this paper is the design of a new concept of modular parallel mechanisms for three, four or five-axis machining applications. Most parallel mechanisms are designed ...
Damien Chablat, Philippe Wenger
CLEIEJ
2000
91views more  CLEIEJ 2000»
15 years 2 months ago
Low Cost Cluster Architectures for Parallel and Distributed Processing
Cluster based architectures are standing out in the last years as an alternative for the construction of versatile, low cost parallel machines. This versatility permits their use ...
Giancarlo C. Mai, César A. F. De Rose
QUESTA
2008
73views more  QUESTA 2008»
15 years 1 months ago
Optimal control of parallel server systems with many servers in heavy traffic
We consider a parallel server system that consists of several customer classes and server pools in parallel. We propose a simple robust control policy to minimize the total linear...
J. G. Dai, Tolga Tezcan