Sciweavers

2181 search results - page 304 / 437
» The restriction scaffold problem
Sort
View
CRYPTO
2007
Springer
130views Cryptology» more  CRYPTO 2007»
14 years 3 months ago
Reducing Trust in the PKG in Identity Based Cryptosystems
One day, you suddenly find that a private key corresponding to your Identity is up for sale at e-Bay. Since you do not suspect a key compromise, perhaps it must be the PKG who is...
Vipul Goyal
ECUMN
2007
Springer
14 years 3 months ago
Study and Enhancement of DCCP over DiffServ Assured Forwarding Class
The Datagram Congestion Control Protocol (DCCP) has been proposed as a transport protocol which supports real-time traffic. In this paper, we focus on the use of DCCP/CCID3 (Cong...
Emmanuel Lochin, Guillaume Jourjon, Laurent Dairai...
GECCO
2007
Springer
181views Optimization» more  GECCO 2007»
14 years 3 months ago
Exploring selection mechanisms for an agent-based distributed evolutionary algorithm
In this paper we propose an agent-based model of evolutionary algorithms (EAs) which extends seamlessly from concurrent single-host to distributed multi-host installations. Since ...
A. E. Eiben, Marc Schoenauer, Juan Luís Jim...
HPCC
2007
Springer
14 years 3 months ago
Open Box Protocol (OBP)
In this paper we propose a new explicit congestion control approach, Open Box Protocol (OBP). The OBP gives sources the capacity to look inside the network and to make their conges...
Paulo Loureiro, Saverio Mascolo, Edmundo Monteiro
IFIP
2007
Springer
14 years 3 months ago
Securing Current and Future Process Control Systems
Process control systems (PCSs) are instrumental to the safe, reliable and efficient operation of many critical infrastructure components. However, PCSs increasingly employ commodit...
Robert K. Cunningham, Steven Cheung, Martin W. Fon...