Sciweavers

905 search results - page 42 / 181
» Public key distribution through
Sort
View
INFOCOM
2008
IEEE
14 years 2 months ago
A Scalable Method for Access Control in Location-Based Broadcast Services
Abstract. One important problem for such public broadcast LBS is to enforce access control on a large number of subscribers. In such a system a user typically subscribes to a LBS f...
Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Li...
IDC
2009
Springer
13 years 5 months ago
Emergent Properties for Data Distribution in a Cognitive MAS
Emergence is a key element in the research of multi-agent systems. Emergent properties provide higher level features to a system formed of simpler individuals. So far, emergence ha...
Andrei Olaru, Cristian Gratie, Adina Magda Florea
ASIACRYPT
2008
Springer
13 years 9 months ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi
EUROPAR
2004
Springer
14 years 1 months ago
Understanding Buffer Management for Cut-Through 1D Rings
Abstract. This paper describes the impact that buffer management has on network performance for a cut-through 1D ring. Such network provides only one routing alternative between ea...
Cruz Izu, Ramón Beivide
ECML
2007
Springer
13 years 11 months ago
Seeing the Forest Through the Trees: Learning a Comprehensible Model from an Ensemble
Abstract. Ensemble methods are popular learning methods that usually increase the predictive accuracy of a classifier though at the cost of interpretability and insight in the deci...
Anneleen Van Assche, Hendrik Blockeel