Sciweavers

4190 search results - page 550 / 838
» Implementing commitment-based interactions
Sort
View
122
Voted
IJHPCA
2006
99views more  IJHPCA 2006»
15 years 3 months ago
A Pragmatic Analysis Of Scheduling Environments On New Computing Platforms
Today, large scale parallel systems are available at relatively low cost. Many powerful such systems have been installed all over the world and the number of users is always incre...
Lionel Eyraud
134
Voted
IJWET
2006
89views more  IJWET 2006»
15 years 3 months ago
Enforcing web services business protocols at run-time: a process-driven approach
: Business processes provide abstractions for modelling business protocols that define the correct interactions between two or more Web services (WS). It has been shown that it is ...
Biörn Biörnstad, Cesare Pautasso, Gustav...
136
Voted
JCP
2008
116views more  JCP 2008»
15 years 3 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
129
Voted
JUCS
2008
117views more  JUCS 2008»
15 years 3 months ago
Eliminating Cycles in Weak Tables
: Weak References constitute an elegant mechanism for an application to interact with its garbage collector. In most of its typical uses, weak references are used through weak tabl...
Alexandra Barros, Roberto Ierusalimschy
162
Voted
JOC
2006
116views more  JOC 2006»
15 years 3 months ago
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order
Abstract. In response to the current need for fast, secure and cheap public-key cryptography, we propose an interactive zero-knowledge identification scheme and a derived signature...
Marc Girault, Guillaume Poupard, Jacques Stern