Sciweavers

1988 search results - page 214 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
129
Voted
IACR
2011
129views more  IACR 2011»
14 years 2 months ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter
129
Voted
ICVS
2001
Springer
15 years 7 months ago
A Fault-Tolerant Distributed Vision System Architecture for Object Tracking in a Smart Room
Abstract. In recent years, distributed computer vision has gained a lot of attention within the computer vision community for applications such as video surveillance and object tra...
Deepak R. Karuppiah, Zhigang Zhu, Prashant J. Shen...
130
Voted
CASCON
1996
126views Education» more  CASCON 1996»
15 years 4 months ago
Evaluating the costs of management: a distributed applications management testbed
In today's distributed computing environments, users are makingincreasing demands on the systems, networks, and applications they use. Users are coming to expect performance,...
Michael Katchabaw, Stephen L. Howard, Andrew D. Ma...
136
Voted
WWW
2004
ACM
16 years 3 months ago
Edgecomputing: extending enterprise applications to the edge of the internet
Content delivery networks have evolved beyond traditional distributed caching. With services such as Akamai's EdgeComputing it is now possible to deploy and run enterprise bu...
Andy Davis, Jay Parikh, William E. Weihl
WWW
2002
ACM
16 years 3 months ago
Abstracting application-level web security
ing Application-Level Web Security David Scott Laboratory For Communications Engineering Engineering Department Trumpington Street Cambridge CB2 1PZ djs55@eng.cam.ac.uk Richard Sha...
David Scott, Richard Sharp