Sciweavers

192 search results - page 22 / 39
» Who gets spammed
Sort
View
EUROPKI
2004
Springer
14 years 27 days ago
Threshold Password-Based Authentication Using Bilinear Pairings
We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private k...
Songwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Ki...
IPPS
2003
IEEE
14 years 24 days ago
Benchmark and Framework for Encouraging Research on Multi-Threaded Testing Tools
A problem that has been getting prominence in testing is that of looking for intermittent bugs. Multi-threaded code is becoming very common, mostly on the server side. As there is...
Klaus Havelund, Scott D. Stoller, Shmuel Ur
GECCO
2010
Springer
154views Optimization» more  GECCO 2010»
14 years 9 days ago
Evolutionary learning in networked multi-agent organizations
This study proposes a simple computational model of evolutionary learning in organizations informed by genetic algorithms. Agents who interact only with neighboring partners seek ...
Jae-Woo Kim
SC
2000
ACM
13 years 12 months ago
Expressing and Enforcing Distributed Resource Sharing Agreements
Advances in computing and networking technology, and an explosion in information sources has resulted in a growing number of distributed systems getting constructed out of resourc...
Tao Zhao, Vijay Karamcheti
ICSM
1994
IEEE
13 years 11 months ago
A Change Analysis Process to Characterize Software Maintenance Projects
In order to improve software maintenance processes, we need to be able to first characterize and assess them. This task needs to be performed in depth and with objectivity since t...
Lionel C. Briand, Victor R. Basili, Yong-Mi Kim, D...