Sciweavers

2321 search results - page 270 / 465
» A Protocol for a Distributed Recommender System
Sort
View
ASIACRYPT
2001
Springer
15 years 9 months ago
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes
Threshold cryptosystems and signature schemes give ways to distribute trust throughout a group and increase the availability of cryptographic systems. A standard approach in design...
Anna Lysyanskaya, Chris Peikert
WETICE
1998
IEEE
15 years 9 months ago
An Open Architecture for Supporting Collaboration on the Web
The MEMOIR framework supports researchers working with a vast quantity of distributed information, by assisting them in finding both relevant documents and researchers with relate...
David De Roure, Wendy Hall, Siegfried Reich, Aggel...
133
Voted
SIGSOFT
1998
ACM
15 years 9 months ago
Formal Modeling and Analysis of the HLA Component Integration Standard
An increasingly important trend in the engineering of complex systems is the design of component integration standards. Such standards de ne rules of interaction and shared commun...
Robert Allen, David Garlan
147
Voted
JPDC
2006
105views more  JPDC 2006»
15 years 4 months ago
Mutual anonymous overlay multicast
Multicast services are demanded by a variety of applications. Many applications require anonymity during their communication. However, there has been very little work on anonymous...
Li Xiao, Yunhao Liu, Wenjun Gu, Dong Xuan, Xiaomei...
125
Voted
WETICE
1999
IEEE
15 years 9 months ago
More Flexible Data Types
XML, as "the next generation ASCII", can play several roles in a distributed object system; one of the more exciting ones is as the basis for serialized data representat...
Mike Spreitzer, Andrew Begel