Sciweavers

59 search results - page 8 / 12
» Universality and Tolerance
Sort
View
CRYPTO
1987
Springer
87views Cryptology» more  CRYPTO 1987»
14 years 1 months ago
How to Make Replicated Data Secure
Many distributed systems manage some form of long-lived data, such as files or data bases. The performance and fault-tolerance of such systems may be enhanced if the repositories ...
Maurice Herlihy, J. D. Tygar
DAC
2002
ACM
14 years 10 months ago
Software-based diagnosis for processors
Software-based self-test (SBST) is emerging as a promising technology for enabling at-speed test of high-speed microprocessors using low-cost testers. We explore the fault diagnos...
Li Chen, Sujit Dey
TCC
2007
Springer
114views Cryptology» more  TCC 2007»
14 years 3 months ago
Multi-authority Attribute Based Encryption
Abstract. In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in whic...
Melissa Chase
ICCSA
2005
Springer
14 years 3 months ago
Resource and Service Discovery in the iGrid Information Service
In this paper we describe resource and service discovery mechanisms available in iGrid, a novel Grid Information Service based on the relational model. iGrid is developed within th...
Giovanni Aloisio, Massimo Cafaro, Italo Epicoco, S...
MWCN
2004
Springer
14 years 3 months ago
Peer-to-Peer Based Architecture for Mobility Management in Wireless Networks
: Mobility management is an important task in wireless networks. The Mobile IP protocol provides a basic solution to the mobility management. However, Mobile IP suffers from severa...
Shou-Chih Lo, Wen-Tsuen Chen