Sciweavers

3271 search results - page 94 / 655
» Controlled Multicast Framework
Sort
View
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
15 years 9 months ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani
IDMS
1999
Springer
143views Multimedia» more  IDMS 1999»
15 years 8 months ago
Quality of Service Management for Teleteaching Applications Using the MPEG-4/DMIF
In the context of distributed multimedia applications involving multicast to a large number of users, a single quality of service level may not be appropriate for all participants....
Gregor von Bochmann, Zhen Yang
ICPP
1998
IEEE
15 years 8 months ago
Efficient Collective Communication on Heterogeneous Networks of Workstations
Networks of Workstations (NOW) have become an attractive alternative platform for high performance computing. Due to the commodity nature of workstations and interconnects and due...
Mohammad Banikazemi, Vijay Moorthy, Dhabaleswar K....
DEBS
2008
ACM
15 years 5 months ago
Event dissemination via group-aware stream filtering
We consider a distributed system that disseminates highvolume event streams to many simultaneous monitoring applications over a low-bandwidth network. For bandwidth efficiency, we...
Ming Li, David Kotz
CSFW
2006
IEEE
15 years 9 months ago
Games for Controls
We argue that games are expressive enough to encompass (history-based) access control, (resource) usage control (e.g., dynamic adaptive access control of reputation systems), acco...
Krishnendu Chatterjee, Radha Jagadeesan, Corin Pit...