Sciweavers

2139 search results - page 249 / 428
» Distributed computing and computer security education
Sort
View
ASIACRYPT
2001
Springer
15 years 7 months ago
Fully Distributed Threshold RSA under Standard Assumptions
The aim of this article is to propose a fully distributed environment for the RSA scheme. What we have in mind is highly sensitive applications and even if we are ready to pay a pr...
Pierre-Alain Fouque, Jacques Stern
JCDL
2005
ACM
153views Education» more  JCDL 2005»
15 years 9 months ago
Developing the DigiQUAL protocol for digital library evaluation
The distributed, project-oriented nature of digital libraries (DLs) has made them difficult to evaluate in aggregate. By modifying the methods and tools used to evaluate tradition...
Martha Kyrillidou, Sarah Giersch
PODC
2005
ACM
15 years 9 months ago
Simultaneous broadcast revisited
Simultaneous Broadcast protocols allow different parties to broadcast values in parallel while guaranteeing mutual independence of the broadcast values. In this work, we study va...
Alejandro Hevia, Daniele Micciancio
160
Voted
AAAI
2006
15 years 4 months ago
When Gossip is Good: Distributed Probabilistic Inference for Detection of Slow Network Intrusions
Intrusion attempts due to self-propagating code are becoming an increasingly urgent problem, in part due to the homogeneous makeup of the internet. Recent advances in anomalybased...
Denver Dash, Branislav Kveton, John Mark Agosta, E...
IPPS
2007
IEEE
15 years 9 months ago
Biomolecular Path Sampling Enabled by Processing in Network Storage
Computationally complex and data intensive atomic scale biomolecular simulation is enabled via Processing in Network Storage (PINS): a novel distributed system framework to overco...
Paul Brenner, Justin M. Wozniak, Douglas Thain, Aa...