Sciweavers

563 search results - page 74 / 113
» Verifiable Signature Sharing
Sort
View
WETICE
2005
IEEE
14 years 2 months ago
A Reputation Management System in Structured Peer-to-Peer Networks
Since there is no method to verify the trustworthiness of shared files in P2P systems, malicious peers can spread untrustworthy files to the system. In order to prevent untrustw...
So Young Lee, O-Hoon Kwon, Jong Kim, Sung Je Hong
ADAEUROPE
2005
Springer
14 years 2 months ago
Extending Ravenscar with CSP Channels
Abstract. The Ravenscar Profile is a restricted subset of the Ada tasking model, designed to meet the requirements of producing analysable and deterministic code. A central featur...
Diyaa-Addein Atiya, Steve King
ICCS
2005
Springer
14 years 2 months ago
Publish/Subscribe Systems on Node and Link Error Prone Mobile Environments
Abstract. Publish/subscribe model is appropriate in many push based data dissemination applications such as data dissemination services, information sharing, service discovery, etc...
Sangyoon Oh, Sangmi Lee Pallickara, Sung Hoon Ko, ...
ICICS
2004
Springer
14 years 2 months ago
Robust Metering Schemes for General Access Structures
In order to decide on advertisement fees for web servers, Naor and Pinkas introduced (threshold) metering schemes secure against coalitions of corrupt servers and clients. They sho...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
ISCAS
2002
IEEE
92views Hardware» more  ISCAS 2002»
14 years 1 months ago
Low cost floating-point unit design for audio applications
This paper presents a low-cost, single-cycle floating-point unit developed for digital audio processing applications. In the unit, the serial steps of floating-point operations ar...
Sung-Won Lee, In-Cheol Park