Sciweavers

24529 search results - page 209 / 4906
» Computing on Authenticated Data
Sort
View
ACISP
2006
Springer
15 years 7 months ago
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Efficient authentication is one of important security requirements in mobile ad hoc network (MANET) routing systems. The techniques of digital signatures are generally considered a...
Shidi Xu, Yi Mu, Willy Susilo
139
Voted
PLDI
1995
ACM
15 years 7 months ago
APT: A Data Structure for Optimal Control Dependence Computation
The control dependence relation is used extensively in restructuring compilers. This relation is usually represented using the control dependence graph; unfortunately, the size of...
Keshav Pingali, Gianfranco Bilardi
IEEEHPCS
2010
14 years 10 months ago
Preliminary results for Atmospheric Remote Sensing data processing through Grid computing
In September 2009, the Indian Remote Sensing OCEANSAT-2 satellite was launched from Sriharikota (India). Moreover, OCEANSAT-2 carry on-board a third payload, called ROSA (Radio Oc...
Lorenzo Mossucca, Olivier Terzo, Maurizio Molinaro...
100
Voted
UAIS
2002
77views more  UAIS 2002»
15 years 3 months ago
Dialoguing with developers and suppliers of adaptive computer technologies: Data and recommendations
The authors report on findings on computer technology needs and concerns of 725 Canadian college and university students with a wide range of disabilities. The vast majority of thi...
Jennison V. Asuncion, Catherine S. Fichten, Myrtis...
119
Voted
IPPS
2007
IEEE
15 years 9 months ago
A Semi-Distributed Axiomatic Game Theoretical Mechanism for Replicating Data Objects in Large Distributed Computing Systems
Replicating data objects onto servers across a system can alleviate access delays. The selection of data objects and servers requires solving a constraint optimization problem, wh...
Samee Ullah Khan, Ishfaq Ahmad