Sciweavers

1923 search results - page 87 / 385
» Modeling Complexity in Secure Distributed Computing
Sort
View
COMSUR
2011
221views Hardware» more  COMSUR 2011»
13 years 9 months ago
Computational Intelligence in Wireless Sensor Networks: A Survey
—Wireless sensor networks (WSNs) are networks of distributed autonomous devices that can sense or monitor physical or environmental conditions cooperatively. WSNs face many chall...
Raghavendra V. Kulkarni, A. Forster, Ganesh K. Ven...
CCGRID
2010
IEEE
14 years 11 months ago
Streamflow Programming Model for Data Streaming in Scientific Workflows
Geo-sciences involve large-scale parallel models, high resolution real time data from highly asynchronous and heterogeneous sensor networks and instruments, and complex analysis a...
Chathura Herath, Beth Plale
COLCOM
2007
IEEE
15 years 4 months ago
Secure scripting based composite application development: Framework, architecture, and implementation
—Dynamic scripting languages such as Ruby provide language features that enable developers to express their intent more rapidly and with fewer expressions. Organizations started ...
Tom Dinkelaker, Alisdair Johnstone, Yücel Kar...
CP
2007
Springer
15 years 4 months ago
Answer Set Optimization for and/or Composition of CP-Nets: A Security Scenario
Defence trees and CP-net (ceteris paribus network) are two useful approaches that can be used to help a system administrator to analyze a security scenario and to give him a model ...
Stefano Bistarelli, Pamela Peretti, Irina Trubitsy...
ASIACRYPT
2007
Springer
15 years 1 months ago
Simple and Efficient Perfectly-Secure Asynchronous MPC
Secure multi-party computation (MPC) allows a set of n players to securely compute an agreed function of their inputs, even when up to t players are under the control of an adversa...
Zuzana Beerliová-Trubíniová, ...