Sciweavers

59 search results - page 8 / 12
» Universality and Tolerance
Sort
View
CRYPTO
1987
Springer
87views Cryptology» more  CRYPTO 1987»
15 years 7 months ago
How to Make Replicated Data Secure
Many distributed systems manage some form of long-lived data, such as files or data bases. The performance and fault-tolerance of such systems may be enhanced if the repositories ...
Maurice Herlihy, J. D. Tygar
DAC
2002
ACM
16 years 5 months ago
Software-based diagnosis for processors
Software-based self-test (SBST) is emerging as a promising technology for enabling at-speed test of high-speed microprocessors using low-cost testers. We explore the fault diagnos...
Li Chen, Sujit Dey
TCC
2007
Springer
114views Cryptology» more  TCC 2007»
15 years 10 months ago
Multi-authority Attribute Based Encryption
Abstract. In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in whic...
Melissa Chase
ICCSA
2005
Springer
15 years 10 months ago
Resource and Service Discovery in the iGrid Information Service
In this paper we describe resource and service discovery mechanisms available in iGrid, a novel Grid Information Service based on the relational model. iGrid is developed within th...
Giovanni Aloisio, Massimo Cafaro, Italo Epicoco, S...
MWCN
2004
Springer
15 years 9 months ago
Peer-to-Peer Based Architecture for Mobility Management in Wireless Networks
: Mobility management is an important task in wireless networks. The Mobile IP protocol provides a basic solution to the mobility management. However, Mobile IP suffers from severa...
Shou-Chih Lo, Wen-Tsuen Chen