Sciweavers

5790 search results - page 215 / 1158
» Distributed programming with distributed authorization
Sort
View
APPT
2005
Springer
15 years 8 months ago
Principal Component Analysis for Distributed Data Sets with Updating
Identifying the patterns of large data sets is a key requirement in data mining. A powerful technique for this purpose is the principal component analysis (PCA). PCA-based clusteri...
Zheng-Jian Bai, Raymond H. Chan, Franklin T. Luk
EMO
2005
Springer
107views Optimization» more  EMO 2005»
15 years 8 months ago
Multiobjective Water Pinch Analysis of the Cuernavaca City Water Distribution Network
Water systems often allow efficient water uses via water reuse and/or recirculation. Defining the network layout connecting water-using processes is a complex problem which involv...
Carlos E. Mariano-Romero, Víctor Alcocer-Ya...
FC
2005
Springer
83views Cryptology» more  FC 2005»
15 years 8 months ago
Secure Distributed Human Computation
We suggest a general paradigm of using large-scale distributed computation to solve difficult problems, but where humans can act as agents and provide candidate solutions. We are e...
Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebi...
IFIP
2005
Springer
15 years 8 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan
DISCEX
2003
IEEE
15 years 8 months ago
Analyzing Interaction Between Distributed Denial of Service Attacks And Mitigation Technologies
Under sponsorship of the Defense Advanced Research Projects Agency’s (DARPA) Fault Tolerant Networks (FTN) program, The Johns Hopkins University Applied Physics Laboratory (JHU/...
W. J. Blackert, D. M. Gregg, A. K. Castner, E. M. ...