Sciweavers

1988 search results - page 279 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
EUROPAR
2003
Springer
14 years 2 months ago
Modeling Context-Aware Behavior by Interpreted ECA Rules
The software architecture of distributed systems is about to change due to new requirements of modern mobile devices. New network techniques, like ad-hoc radio communication or pee...
Wolfgang Beer, Volker Christian, Alois Ferscha, La...
GCC
2007
Springer
14 years 3 months ago
Image Filtering on .NET-based Desktop Grids
Image filtering is the use of computer graphics algorithms to enhance the quality of digital images or to extract information about their content. However rendering very large siz...
Christian Vecchiola, Krishna Nadiminti, Rajkumar B...
CCS
2011
ACM
12 years 9 months ago
PaperSpeckle: microscopic fingerprinting of paper
Paper forgery is among the leading causes of corruption in many developing regions [2]. In this paper, we introduce PaperSpeckle, a robust system that leverages the natural random...
Ashlesh Sharma, Lakshminarayanan Subramanian, Eric...
NSPW
2006
ACM
14 years 3 months ago
PKI design for the real world
What would a PKI look like if it were designed for implementability and deployability rather than strict adherence to a particular theoretical or mathematical model? This paper pr...
Peter Gutmann
JSAC
2007
93views more  JSAC 2007»
13 years 9 months ago
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
— Vehicular Networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. However, security is a critical factor an...
Maxim Raya, Panagiotis Papadimitratos, Imad Aad, D...