Sciweavers

1426 search results - page 190 / 286
» A control-based framework for self-managing distributed comp...
Sort
View
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
15 years 6 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes
CIKM
2011
Springer
14 years 1 months ago
On the elasticity of NoSQL databases over cloud management platforms
NoSQL databases focus on analytical processing of large scale datasets, offering increased scalability over commodity hardware. One of their strongest features is elasticity, whi...
Ioannis Konstantinou, Evangelos Angelou, Christina...
GIS
2008
ACM
16 years 3 months ago
Composing geoinformatics workflows with user preferences
With the advent of the data grid came a novel distributed scientific computing paradigm known as service-oriented science. Among the plethora of systems included under this framew...
David Chiu, Sagar Deshpande, Gagan Agrawal, Rongxi...
ISORC
2009
IEEE
15 years 8 months ago
Resource Scopes: Toward Language Support for Compositional Determinism
Complex real-time embedded systems should be compositional and deterministic in the resource, time, and value domains. Determinism eases the engineering of correct systems and com...
Madhukar Anand, Sebastian Fischmeister, Insup Lee
CIDR
2011
224views Algorithms» more  CIDR 2011»
14 years 5 months ago
Transactional Intent
Data state in a data management system such as a database is the result of the transactions performed on that data management system. Approaches such as single-message transaction...
Shel Finkelstein, Thomas Heinzel, Rainer Brendle, ...