Sciweavers

12562 search results - page 2096 / 2513
» Distributed Xbean Applications
Sort
View
ICISC
2003
89views Cryptology» more  ICISC 2003»
15 years 6 months ago
Security Analysis of Some Proxy Signatures
Abstract. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...
UAI
2001
15 years 6 months ago
Hypothesis Management in Situation-Specific Network Construction
This paper considers the problem of knowledgebased model construction in the presence of uncertainty about the association of domain entities to random variables. Multi-entity Bay...
Kathryn B. Laskey, Suzanne M. Mahoney, Ed Wright
USENIX
2001
15 years 6 months ago
Design and Implementation of the X Rendering Extension
The 2000 Usenix Technical Conference included a presentation outlining the state of the X rendering environment and the capabilities necessary to bring X into the modern world. Du...
Keith Packard
PDPTA
2003
15 years 6 months ago
The Performance of Routing Algorithms under Bursty Traffic Loads
Routing algorithms are traditionally evaluated under Poisson-like traffic distributions. This type of traffic is smooth over large time intervals and has been shown not necessaril...
Jeonghee Shin, Timothy Mark Pinkston
122
Voted
DOA
2000
105views more  DOA 2000»
15 years 5 months ago
CORBA Solutions for Interoperability in Mobile Agent Environments
The Mobile Agent (MA) paradigm proposes several attractive solutions to deal with the problems of networkcentric programming. Despite the availability of several MA platforms, the...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
« Prev « First page 2096 / 2513 Last » Next »