Sciweavers

234 search results - page 34 / 47
» Evolving Messaging Systems for Secure Role Based Messaging
Sort
View
CCS
1994
ACM
15 years 3 months ago
The Design and Implementation of Tripwire: A File System Integrity Checker
At the heart of most computer systems is a file system. The file system contains user data, executable programs, configuration and authorization information, and (usually) the bas...
Gene H. Kim, Eugene H. Spafford
69
Voted
SIGMETRICS
2008
ACM
14 years 11 months ago
A Diophantine model of routes in structured P2P overlays
Abstract-- An important intrinsic property of any structured Peer-to-Peer (P2P) overlay is multi-hop paths. Understanding their structure helps to solve challenging problems relate...
Dmitry Korzun, Andrei Gurtov
JDM
2008
114views more  JDM 2008»
14 years 11 months ago
Bug Fixing Practices within Free/Libre Open Source Software Development Teams
Free/libre open source software (FLOSS, e.g., Linux or Apache) is primarily developed by distributed teams. Developers contribute from around the world and coordinate their activi...
Kevin Crowston, Barbara Scozzi
CISC
2009
Springer
199views Cryptology» more  CISC 2009»
14 years 9 months ago
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing
Abstract. Certificateless cryptography introduced by Al-Riyami and Paterson eliminates the key escrow problem inherent in identity based cryptosystems. Even though building practic...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
ICPADS
2002
IEEE
15 years 4 months ago
Communication Pattern Based Methodology for Performance Analysis of Termination Detection Schemes
Efficient determination of processing termination at barrier synchronization points can occupy an important role in the overall throughput of parallel and distributed computing sy...
Yili Tseng, Ronald F. DeMara