Sciweavers

1498 search results - page 30 / 300
» Network control as a distributed object application
Sort
View
CSFW
2003
IEEE
15 years 9 months ago
Type-Based Distributed Access Control
A type system is presented that combines a weak form of information flow control, termed distributed access control in the paper, with typed cryptographic operations. The motivat...
Tom Chothia, Dominic Duggan, Jan Vitek
140
Voted
NDSS
2005
IEEE
15 years 9 months ago
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for...
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan ...
151
Voted
CDC
2008
IEEE
142views Control Systems» more  CDC 2008»
15 years 10 months ago
Asynchronous distributed optimization with minimal communication
— We consider problems where multiple agents must cooperate to control their individual state so as to optimize a common objective while communicating with each other to exchange...
Minyi Zhong, Christos G. Cassandras
123
Voted
MM
2004
ACM
104views Multimedia» more  MM 2004»
15 years 9 months ago
Supporting continuous consistency in multiplayer online games
Multiplayer online games have become very popular in recent years. However, they generally suffer from network latency problem. If a player changes its states, it will take some ...
Frederick W. B. Li, Lewis W. F. Li, Rynson W. H. L...
132
Voted
TOOLS
1997
IEEE
15 years 7 months ago
Propagator: A Family of Patterns
PROPAGATOR is a family of patterns for consistently updating objects in a dependency network. The propagator patterns are found in such diverse applications as MAKE, WWW, spreadsh...
Peter H. Feiler, Walter F. Tichy