Sciweavers

1988 search results - page 5 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
TCC
2004
Springer
147views Cryptology» more  TCC 2004»
14 years 2 months ago
Computational Collapse of Quantum State with Application to Oblivious Transfer
Quantum 2-party cryptography differs from its classical counterpart in at least one important way: Given blak-box access to a perfect commitment scheme there exists a secure 1−2...
Claude Crépeau, Paul Dumais, Dominic Mayers...
SACMAT
2004
ACM
14 years 3 months ago
Role-based access control in ambient and remote space
In the era of Ubiquitous Computing and world–wide data transfer mobility, as an innovative aspect of professional activities, imposes new and complex problems of mobile and dist...
Horst Wedde, Mario Lischka
HICSS
2006
IEEE
165views Biometrics» more  HICSS 2006»
14 years 3 months ago
The Data Warehouse in a Distributed Utility Environment
Utility provisioning, Grid resource management, instant copy kiosks, and network transfers provide an exciting new paradigm for data warehouse functions. Grid technologies are fas...
Charles A. Milligan
MOBICOM
2005
ACM
14 years 3 months ago
VITP: an information transfer protocol for vehicular computing
Recent advances in wireless inter-vehicle communication systems enable the development of Vehicular Ad-Hoc Networks (VANET) and create significant opportunities for the deploymen...
Marios D. Dikaiakos, Saif Iqbal, Tamer Nadeem, Liv...
CLUSTER
2009
IEEE
14 years 4 months ago
Integrating software distributed shared memory and message passing programming
Abstract—Software Distributed Shared Memory (SDSM) systems provide programmers with a shared memory programming environment across distributed memory architectures. In contrast t...
H'sien J. Wong, Alistair P. Rendell