Sciweavers

5790 search results - page 125 / 1158
» Distributed programming with distributed authorization
Sort
View
119
Voted
ISBI
2008
IEEE
16 years 2 months ago
Distributed online anomaly detection in high-content screening
This paper presents an automated, online approach to anomaly detection in high-content screening assays for pharmaceutical research. Online detection of anomalies is attractive be...
Adam Goode, Rahul Sukthankar, Lily B. Mummert, Mei...
ICSE
2004
IEEE-ACM
16 years 2 months ago
Managing Commitments and Risks: Challenges in Distributed Agile Development
Software development is always a challenging undertaking and it requires high commitments from individuals who participate in it. Software development often involves new technolog...
Jan Rydén, Jyrki Kontio, Magnus Höglun...
OTM
2005
Springer
15 years 7 months ago
Empirical Evaluation of Dynamic Local Adaptation for Distributed Mobile Applications
Distributed mobile applications operate on devices with diverse capabilities, in heterogeneous environments, where parameters such as processor, memory and network utilisation, are...
Pablo Rossi, Caspar Ryan
EUROPKI
2004
Springer
15 years 7 months ago
Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography
The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification au...
Charikleia Zouridaki, Brian L. Mark, Kris Gaj, Ros...
128
Voted
PKC
1999
Springer
86views Cryptology» more  PKC 1999»
15 years 6 months ago
Preserving Privacy in Distributed Delegation with Fast Certificates
Abstract. In a distributed system, dynamically dividing execution between nodes is essential for service robustness. However, when all of the nodes cannot be equally trusted, and w...
Pekka Nikander, Yki Kortesniemi, Jonna Partanen