Sciweavers

2927 search results - page 178 / 586
» Secure Distributed Human Computation
Sort
View
119
Voted
ATC
2007
Springer
15 years 6 months ago
Design of Service-Based Systems with Adaptive Tradeoff Between Security and Service Delay
Service-based Systems (SBS) have the advantage of composing distributed systems from various services provided by multiple providers transparently. In addition to functional correc...
Stephen S. Yau, Min Yan, Dazhi Huang
DCC
2010
IEEE
15 years 2 months ago
Practical unconditionally secure two-channel message authentication
We investigate unconditional security for message authentication protocols that are designed using two-channel cryptography. We look at both noninteractive message authentication ...
Atefeh Mashatan, Douglas R. Stinson
PDP
2008
IEEE
15 years 8 months ago
VieBOP: Extending BPEL Engines with BPEL4People
The need for integration of human interaction scenarios into BPEL processes lead to the formalisation of tasks and human roles. The specifications BPEL4People and WSHumanTask int...
Ta'id Holmes, Martin Vasko, Schahram Dustdar
WMASH
2003
ACM
15 years 7 months ago
Challenge: ubiquitous location-aware computing and the "place lab" initiative
To be widely adopted, location-aware computing must be as effortless, familiar and rewarding as web search tools like Google. We envisage the global scale Place Lab, consisting of...
Bill N. Schilit, Anthony LaMarca, Gaetano Borriell...
124
Voted
UPP
2004
Springer
15 years 7 months ago
Grassroots Approach to Self-management in Large-Scale Distributed Systems
Abstract. Traditionally, autonomic computing is envisioned as replacing the human factor in the deployment, administration and maintenance of computer systems that are ever more co...
Özalp Babaoglu, Márk Jelasity, Alberto...