Sciweavers

2250 search results - page 166 / 450
» Authorizing applications in singularity
Sort
View
76
Voted
ACNS
2005
Springer
97views Cryptology» more  ACNS 2005»
15 years 3 months ago
Quantifying Security in Hybrid Cellular Networks
Abstract. We propose a micro-payment scheme for symmetric multihop cellular networks that encourages intermediaries to transmit packets and recipients to provide auditing informati...
Markus Jakobsson, Liu Yang
FCA
2005
Springer
201views Formal Methods» more  FCA 2005»
15 years 3 months ago
A Survey of Formal Concept Analysis Support for Software Engineering Activities
Formal Concept Analysis (FCA) has typically been applied in the field of software engineering to support software maintenance and object-oriented class identification tasks. This...
Thomas Tilley, Richard Cole, Peter Becker 0002, Pe...
PATMOS
2005
Springer
15 years 3 months ago
Improving the Memory Bandwidth Utilization Using Loop Transformations
Abstract. Embedded devices designed for various real-time multimedia and telecom applications, have a bottleneck in energy consumption and performance that becomes day by day more ...
Minas Dasygenis, Erik Brockmeyer, Francky Catthoor...
77
Voted
POLICY
2005
Springer
15 years 3 months ago
Obligation Policies: An Enforcement Platform
The use of policy-based mechanisms significantly reduces the complexity associated with applicational development and operation. In particular, history-based policies allow the s...
Pedro Gama, Paulo Ferreira
DIAU
2000
Springer
15 years 2 months ago
Freenet: A Distributed Anonymous Information Storage and Retrieval System
We describe Freenet, a peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and readers...
Ian Clarke, Oskar Sandberg, Brandon Wiley, Theodor...