Sciweavers

352 search results - page 38 / 71
» Establishing norms with metanorms in distributed computation...
Sort
View
PODC
2011
ACM
14 years 1 months ago
Securing social networks
We present a cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks. The main idea is to u...
Michael Backes, Matteo Maffei, Kim Pecina
TMC
2011
1105views more  TMC 2011»
14 years 5 months ago
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
—Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals. To this end, we propose a privacy-preserving location monit...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He
74
Voted
EOR
2008
123views more  EOR 2008»
14 years 10 months ago
Fixed versus flexible production systems: A real options analysis
In this work, we address investment decisions in production systems by using real options. As is standard in literature, the stochastic variable is assumed to be normally distribu...
Dalila B. M. M. Fontes
ESCIENCE
2006
IEEE
15 years 2 months ago
Authorizing Remote Job Execution Based on Job Properties
: E-Science often requires access to remote Grid computing platforms. Current authorization systems on these remote systems have largely based decisions solely on the identity of t...
Sang-Min Park, Glenn S. Wasson, Marty Humphrey
RTCSA
2009
IEEE
15 years 5 months ago
Periodic and Aperiodic Communication Techniques for Responsive Link
Responsive Link, an ISO/IEC communication standard, provides many functional capabilities for distributed realtime systems. This paper is focused on periodic and aperiodic communi...
Shinpei Kato, Yuji Fujita, Nobuyuki Yamasaki