Sciweavers

2282 search results - page 374 / 457
» Distributed Cryptographic Computing on Grid
Sort
View
159
Voted
ICS
2005
Tsinghua U.
15 years 7 months ago
Continuous Replica Placement schemes in distributed systems
The Replica Placement Problem (RPP) aims at creating a set of duplicated data objects across the nodes of a distributed system in order to optimize certain criteria. Typically, RP...
Thanasis Loukopoulos, Petros Lampsas, Ishfaq Ahmad
CORR
2011
Springer
243views Education» more  CORR 2011»
14 years 8 months ago
Distributed Estimation and False Data Detection with Application to Power Networks
This work presents a distributed method for control centers in a power network to estimate the operating condition of the power plant, and to ultimately determine the occurrence o...
Fabio Pasqualetti, Ruggero Carli, Francesco Bullo
CONCUR
2005
Springer
15 years 7 months ago
Constraint Solving for Contract-Signing Protocols
Research on the automatic analysis of cryptographic protocols has so far mainly concentrated on reachability properties, such as secrecy and authentication. Only recently it was sh...
Detlef Kähler, Ralf Küsters
117
Voted
HIPEAC
2005
Springer
15 years 7 months ago
Arc3D: A 3D Obfuscation Architecture
In DRM domain, the adversary has complete control of the computing node - supervisory privileges along with full physical as well as architectural object observational capabilities...
Mahadevan Gomathisankaran, Akhilesh Tyagi
CBMS
2006
IEEE
15 years 5 months ago
A Distributed Workflow Management System for Automated Medical Image Analysis and Logistics
Advances in medical image analysis have increased the need to integrate and deploy image analysis software in daily clinical routine and in epidemiological studies. We developed a...
Jeroen G. Snel, Sílvia Delgado Olabarriaga,...