Sciweavers

6555 search results - page 1225 / 1311
» Secure attribute-based systems
Sort
View
GCA
2008
13 years 11 months ago
A Grid Resource Broker with Dynamic Loading Prediction Scheduling Algorithm in Grid Computing Environment
In a Grid Computing environment, there are various important issues, including information security, resource management, routing, fault tolerance, and so on. Among these issues, ...
Yi-Lun Pan, Chang-Hsing Wu, Weicheng Huang
ICISC
2008
123views Cryptology» more  ICISC 2008»
13 years 11 months ago
The Swiss-Knife RFID Distance Bounding Protocol
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicini...
Chong Hee Kim, Gildas Avoine, François Koeu...
ISTAR
2008
13 years 11 months ago
Improving the Syntax and Semantics of Goal Modelling Languages
One major obstacle to requirements engineering (RE) is the growing complexity of today's systems. Such a complexity can only be fficiently by powerful abstraction mechanisms a...
Raimundas Matulevicius
CIIT
2004
268views Communications» more  CIIT 2004»
13 years 11 months ago
SSM-ping: A ping utility for source specific multicast
Management has become a key concern for the success of multicast deployment in the Internet. One of the most important management tasks for multicast is to verify the availability...
Pavan Namburi, Kamil Saraç, Kevin C. Almero...
CSREASAM
2006
13 years 11 months ago
Integrating the Generalized-Honeycomb-Torus for Sustainable Parking Structures in the Globalizing Age
Considering disaster sensitivity especially in developing large-scale, multiple-use parking structures, we propose dual-surveillance based SCADA (supervisory control and data acqui...
Hsun-Jung Cho, Li-Yen Hsu
« Prev « First page 1225 / 1311 Last » Next »