Sciweavers

1923 search results - page 129 / 385
» Modeling Complexity in Secure Distributed Computing
Sort
View
ESCIENCE
2007
IEEE
15 years 8 months ago
Distributed and Generic Maximum Likelihood Evaluation
This paper presents GMLE 1 , a generic and distributed framework for maximum likelihood evaluation. GMLE is currently being applied to astroinformatics for determining the shape o...
Travis J. Desell, Nathan Cole, Malik Magdon-Ismail...
123
Voted
EUROCRYPT
2010
Springer
15 years 7 months ago
Adaptively Secure Broadcast
A broadcast protocol allows a sender to distribute a message through a point-to-point network to a set of parties, such that (i) all parties receive the same message, even if the s...
Martin Hirt, Vassilis Zikas
118
Voted
EDO
2000
Springer
15 years 5 months ago
The Importance of Resource Management in Engineering Distributed Objects
: Middleware technologies such as CORBA and DCOM have been developed as a means of tackling heterogeneity and complexity problems inherent in distributed systems. However, more wor...
Hector A. Duran-Limon, Gordon S. Blair
USITS
1997
15 years 3 months ago
Lightweight Security Primitives for E-Commerce
Emerging applications in electronic commerce often involve very low-cost transactions, which execute in the context of ongoing, extended clientserver relationships. For example, c...
Yossi Matias, Alain J. Mayer, Abraham Silberschatz
APNOMS
2008
Springer
15 years 4 months ago
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model
As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the netwo...
Huy Anh Nguyen, Deokjai Choi