Sciweavers

109 search results - page 4 / 22
» csi 2008
Sort
View
CSI
2008
68views more  CSI 2008»
13 years 7 months ago
Privacy and forensics investigation process: The ERPINA protocol
The rights of an Internet user acting anonymously conflicts with the rights of a Server victim identifying the malicious user. The ERPINA protocol, introduced in this paper, allow...
Giannakis Antoniou, Leon Sterling, Stefanos Gritza...
CSI
2006
136views more  CSI 2006»
13 years 7 months ago
A hybrid particle swarm optimization algorithm for optimal task assignment in distributed systems
In a distributed system, a number of application tasks may need to be assigned to different processors such that the system cost is minimized and the constraints with limited reso...
Peng-Yeng Yin, Shiuh-Sheng Yu, Pei-Pei Wang, Yi-Te...
CSI
2007
122views more  CSI 2007»
13 years 7 months ago
Formalization of the RM-ODP foundations based on the Triune Continuum Paradigm
The subject of research in this paper is RM-ODP, an ISO/ITU-T international standard. We investigate an important challenge that the standard faces, specifically the absence of a ...
Andrey Naumenko, Alain Wegmann
CSI
2007
83views more  CSI 2007»
13 years 7 months ago
A model-driven choreography conceptual framework
A number of languages exist that try to model the external visible behavior of services. However, they constitute incomplete solutions, either because, they do not include proper ...
Sinuhé Arroyo, Alistair Duke, José M...
CSI
2007
54views more  CSI 2007»
13 years 7 months ago
A practical verifiable multi-secret sharing scheme
C.-C. Yang, T.-Y. Chang, M.-S. Hwang [C.-C. Yang, T.-Y. Chang, M.-S. Hwang, A (t,n) multi-secret sharing scheme, Applied Mathematics and Computation 151 (2004) 483–490] proposed...
Jian-jie Zhao, Jianzhong Zhang 0005, Rong Zhao