Sciweavers

1363 search results - page 25 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
78
Voted
COMBINATORICS
2000
92views more  COMBINATORICS 2000»
14 years 10 months ago
Asymptotics for the Probability of Connectedness and the Distribution of Number of Components
Let n be the fraction of structures of size" n which are connected"; e.g., a the fraction of labeled or unlabeled n-vertex graphshavingone component, b the fraction of p...
Jason P. Bell, Edward A. Bender, Peter J. Cameron,...
GECCO
2007
Springer
206views Optimization» more  GECCO 2007»
15 years 2 months ago
Using code metric histograms and genetic algorithms to perform author identification for software forensics
We have developed a technique to characterize software developers' styles using a set of source code metrics. This style fingerprint can be used to identify the likely author...
Robert Charles Lange, Spiros Mancoridis
AIRWEB
2007
Springer
15 years 5 months ago
Computing Trusted Authority Scores in Peer-to-Peer Web Search Networks
Peer-to-peer (P2P) networks have received great attention for sharing and searching information in large user communities. The open and anonymous nature of P2P networks is one of ...
Josiane Xavier Parreira, Debora Donato, Carlos Cas...
ICDCS
2011
IEEE
13 years 10 months ago
Authorized Private Keyword Search over Encrypted Data in Cloud Computing
—In cloud computing, clients usually outsource their data to the cloud storage servers to reduce the management costs. While those data may contain sensitive personal information...
Ming Li, Shucheng Yu, Ning Cao, Wenjing Lou
87
Voted
WDAG
2001
Springer
78views Algorithms» more  WDAG 2001»
15 years 3 months ago
Self Stabilizing Distributed Queuing
Distributed queuing is a fundamental coordination problem, arising in a variety of applications, including distributed shared memory, distributed directories, and totally ordered ...
Maurice Herlihy, Srikanta Tirthapura