Sciweavers

12193 search results - page 96 / 2439
» It's not all about
Sort
View
SASO
2007
IEEE
15 years 6 months ago
Identifying Malicious Peers Before It's Too Late: A Decentralized Secure Peer Sampling Service
Many unstructured peer to peer (P2P) systems rely on a Peer Sampling Service (PSS) that returns randomly sampled nodes from the population comprising the system. PSS protocols are...
Gian Paolo Jesi, David Hales, Maarten van Steen
78
Voted
HICSS
2005
IEEE
136views Biometrics» more  HICSS 2005»
15 years 5 months ago
Assessing the Readiness of Internet-Based IOS and Evaluating Its Impact on Adoption
This study explores the readiness factors for the adoption of Internet-based inter-organizational systems (IOS) via a case analysis of fifteen Taiwanese firms. By proposing a thre...
Hsin-Lu Chang, Shin-Horng Chen
DFG
2004
Springer
15 years 5 months ago
Executable HybridUML and Its Application to Train Control Systems
Abstract. In this paper, the authors introduce an extension of UML for the purpose of hybrid systems modeling. The construction uses the profile mechanism of UML 2.0 which is the ...
Kirsten Berkenkötter, Stefan Bisanz, Ulrich H...
EUC
2004
Springer
15 years 5 months ago
Construction of Distributed Object Group Framework and Its Execution Analysis Using Distributed Application Simulation
The Distributed Object Group Framework(DOGF) we constructed supports the grouping of distributed objects that are required for distributed application. From the DOGF, we manage dis...
Chang-Sun Shin, Chang-Won Jeong, Su-Chong Joo
PKC
2004
Springer
195views Cryptology» more  PKC 2004»
15 years 5 months ago
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications
Abstract. Bellare, Boldyreva, Desai, and Pointcheval [1] recently proposed a new security requirement of the encryption schemes called “keyprivacy.” It asks that the encryption...
Ryotaro Hayashi, Tatsuaki Okamoto, Keisuke Tanaka