Sciweavers

759 search results - page 12 / 152
» What Can Be Implemented Anonymously
Sort
View
PC
2007
147views Management» more  PC 2007»
13 years 9 months ago
Thread-safety in an MPI implementation: Requirements and analysis
The MPI-2 Standard has carefully specified the interaction between MPI and usercreated threads. The goal of this specification is to allow users to write multithreaded MPI progr...
William Gropp, Rajeev Thakur
CCS
2008
ACM
13 years 11 months ago
Online subscriptions with anonymous access
Online privacy is an increasingly important problem, as many services are now offered in a digital form. Privacy (or the lack thereof) is of a special concern in subscriptions to ...
Marina Blanton
WISE
2007
Springer
14 years 4 months ago
Web Service Search: Who, When, What, and How
: Web service search is an important problem in service oriented architecture that has attracted widespread attention from academia as well as industry. Web service searching can b...
Jianguo Lu, Yijun Yu
HOTOS
1997
IEEE
14 years 2 months ago
What Synchronous Groupware Needs: Notification Services
Synchronous groupware is the class of applications in which two or more people collaborate in what they perceive to be real time. Most previous efforts to deploy synchronous group...
Mark Day
IPPS
2007
IEEE
14 years 4 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...