Sciweavers

1926 search results - page 353 / 386
» Hierarchical Peer-to-Peer Systems
Sort
View
108
Voted
CCS
2005
ACM
15 years 6 months ago
Direct chosen ciphertext security from identity-based techniques
We describe a new encryption technique that is secure in the standard model against adaptive chosen ciphertext (CCA2) attacks. We base our method on two very efficient Identity-Ba...
Xavier Boyen, Qixiang Mei, Brent Waters
HPCC
2005
Springer
15 years 6 months ago
Enabling the P2P JXTA Platform for High-Performance Networking Grid Infrastructures
Abstract. As grid sizes increase, the need for self-organization and dynamic reconfigurations is becoming more and more important, and therefore the convergence of grid computing ...
Gabriel Antoniu, Mathieu Jan, David A. Noblet
86
Voted
GECCO
2004
Springer
127views Optimization» more  GECCO 2004»
15 years 5 months ago
Computational Complexity and Simulation of Rare Events of Ising Spin Glasses
We discuss the computational complexity of random 2D Ising spin glasses, which represent an interesting class of constraint satisfaction problems for black box optimization. Two ex...
Martin Pelikan, Jiri Ocenasek, Simon Trebst, Matth...
101
Voted
HICSS
2003
IEEE
90views Biometrics» more  HICSS 2003»
15 years 5 months ago
Web Community of Agents for the Integrated Logistics of Industrial Districts
The industrial districts are characterized by the agglomeration of medium and small-sized industries, localized within a certain geographic area with precise social and cultural c...
Mauro Dell'Orco, Raffaele Giordano
SENSYS
2003
ACM
15 years 5 months ago
Timing-sync protocol for sensor networks
Wireless ad-hoc sensor networks have emerged as an interesting and important research area in the last few years. The applications envisioned for such networks require collaborati...
Saurabh Ganeriwal, Ram Kumar, Mani B. Srivastava