Sciweavers

43264 search results - page 8232 / 8653
» Comparing models of computation
Sort
View
119
Voted
DEXAW
2004
IEEE
123views Database» more  DEXAW 2004»
15 years 7 months ago
Self-Adaptive and Self-Optimising Resource Monitoring for Dynamic Grid Environments
As the number of resources on the Grid tends to be very dynamic and potentially large, it becomes increasingly important to discover and monitor them efficiently. This paper conce...
Helene N. Lim Choi Keung, Justin R. D. Dyson, Step...
119
Voted
CCS
2006
ACM
15 years 7 months ago
Deniable authentication and key exchange
We extend the definitional work of Dwork, Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then use these definitions to prove the deniability fe...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
115
Voted
CHES
2006
Springer
111views Cryptology» more  CHES 2006»
15 years 7 months ago
Cache-Collision Timing Attacks Against AES
This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified ...
Joseph Bonneau, Ilya Mironov
CIA
2006
Springer
15 years 7 months ago
Conversation-Based Specification and Composition of Agent Services
There is great promise in the idea of having agent or web services available on the internet, that can be flexibly composed to achieve more complex services, which can themselves t...
Quoc Bao Vo, Lin Padgham
128
Voted
CP
2006
Springer
15 years 7 months ago
Interactive Distributed Configuration
Interactive configuration is the concept of assisting a user in selecting values for parameters that respect given constraints. It was originally inspired by the product configurat...
Peter Tiedemann, Tarik Hadzic, Thomas Stuart Henne...
« Prev « First page 8232 / 8653 Last » Next »