Sciweavers

262 search results - page 29 / 53
» Secure Hamming Distance Based Computation and Its Applicatio...
Sort
View
CASCON
1996
126views Education» more  CASCON 1996»
13 years 9 months ago
Evaluating the costs of management: a distributed applications management testbed
In today's distributed computing environments, users are makingincreasing demands on the systems, networks, and applications they use. Users are coming to expect performance,...
Michael Katchabaw, Stephen L. Howard, Andrew D. Ma...
WSC
2000
13 years 9 months ago
Teaching system modeling, simulation and validation
Simulation is used in the design process of dynamic systems. The results of simulation are employed for validating a model, and they are helpful for the improvement of the design ...
Jörg Desel
USITS
1997
13 years 9 months ago
Lightweight Security Primitives for E-Commerce
Emerging applications in electronic commerce often involve very low-cost transactions, which execute in the context of ongoing, extended clientserver relationships. For example, c...
Yossi Matias, Alain J. Mayer, Abraham Silberschatz
TDSC
2011
13 years 2 months ago
A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
Gang Xu, Cristian Borcea, Liviu Iftode
ICPR
2002
IEEE
14 years 9 months ago
Prototype Selection for Finding Efficient Representations of Dissimilarity Data
The nearest neighbor (NN) rule is a simple and intuitive method for solving classification problems. Originally, it uses distances to the complete training set. It performs well, ...
Elzbieta Pekalska, Robert P. W. Duin