Sciweavers

4273 search results - page 657 / 855
» Autonomic power and performance management for computing sys...
Sort
View
FC
2007
Springer
158views Cryptology» more  FC 2007»
15 years 8 months ago
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
Aggelos Kiayias, Hong-Sheng Zhou
93
Voted
EUSAI
2004
Springer
15 years 7 months ago
Remote Code Execution on Ubiquitous Mobile Applications
Today, most mobile devices (e.g. PDAs) are in some way associated to a fixed personal computer or server. In general this relation is only taken into account for synchronization p...
João Nuno Silva, Paulo Ferreira
WEBNET
2001
15 years 3 months ago
Electronically Assisting Communication for Health Professionals
: New information and computing technologies offer cost efficient and effective learning opportunities for health care professionals. The Assisted Electronic Communication project ...
Peter Scott, Fiona Brooks, Kevin Quick, Maria Maci...
ICS
2003
Tsinghua U.
15 years 7 months ago
miNI: reducing network interface memory requirements with dynamic handle lookup
Recent work in low-latency, high-bandwidth communication systems has resulted in building user–level Network InControllers (NICs) and communication abstractions that support dir...
Reza Azimi, Angelos Bilas
111
Voted
ICDS
2008
IEEE
15 years 8 months ago
A New Server Selection Strategy for Reliable Server Pooling in Widely Distributed Environments
In order to provide a generic, applicationindependent and resource-efficient framework for server redundancy and session failover, the IETF RSerPool WG is currently standardizing ...
Xing Zhou, Thomas Dreibholz, Erwin P. Rathgeb