Sciweavers

1747 search results - page 114 / 350
» Distributed Systems Technology for Electronic Commerce Appli...
Sort
View
129
Voted
JUCS
2008
156views more  JUCS 2008»
15 years 3 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
143
Voted
WISE
2003
Springer
15 years 9 months ago
ServiceCom: A Tool for Service Composition Reuse and Specialization
Web services are becoming the dominant paradigm for distributed computing and electronic business. This has raised the opportunity for service providers and application developers...
Bart Orriëns, Jian Yang, Mike P. Papazoglou
137
Voted
DAC
2006
ACM
15 years 9 months ago
Circuits for energy harvesting sensor signal processing
duce system weight and volume, increase operating lifetime, The recent explosion in capability of embedded and portable decrease maintenance costs, and open new frontiers for inele...
Rajeevan Amirtharajah, Justin Wenck, Jamie Collier...
152
Voted
SIGCOMM
2004
ACM
15 years 9 months ago
A scalable distributed information management system
We present a Scalable Distributed Information Management System (SDIMS) that aggregates information about large-scale networked systems and that can serve as a basic building bloc...
Praveen Yalagandula, Michael Dahlin
178
Voted
EUMAS
2006
15 years 5 months ago
A Customizable Multi-Agent System for Distributed Data Mining
We present a general Multi-Agent System framework for distributed data mining based on a Peer-toPeer model. The framework adopts message-based asynchronous communication and a dyn...
Giancarlo Fortino, Giuseppe Di Fatta