Sciweavers

5891 search results - page 113 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
ICYCS
2008
IEEE
15 years 8 months ago
Computer Ability Assisted Assessment System for Large-Scale Heterogeneous Distributed Environments
In 21 century, an era of information and internet, it is essential for universities to develop their education in order to be focused. Testing online has unparalleled advantages i...
Qing Wu, Wen Ding, Weihua Hu, Bishui Zhou, Tianzho...
STORAGESS
2005
ACM
15 years 7 months ago
Secure capabilities for a petabyte-scale object-based distributed file system
Recently, the Network-Attached Secure Disk (NASD) model has become a more widely used technique for constructing large-scale storage systems. However, the security system proposed...
Christopher Olson, Ethan L. Miller
ISORC
2008
IEEE
15 years 8 months ago
A Hierarchical Resource Management Scheme Enabled by the TMO Programming Scheme
Abstract: For cost-effective realization of sizable realtime distributed computing application systems, significant advances in resource allocation are in critical needs. An advanc...
K. H. (Kane) Kim, Yuqing Li, Kee-Wook Rim, Eltefaa...
HPDC
2005
IEEE
15 years 7 months ago
Design and evaluation of a new and effective fairness scheme for multicasting in Internet-scale distributed systems
This paper argues that simply applying a multipletree scheme does not provide sufficient fairness for applications in an Internet-scale distributed system, in terms of performance...
Yijun Lu, Hong Jiang
124
Voted
DCOSS
2006
Springer
15 years 5 months ago
COTA: A Robust Multi-hop Localization Scheme in Wireless Sensor Networks
In wireless sensor networks, multi-hop localization schemes are very vulnerable to various attacks such as wormholes and range modification attacks. In this paper, we propose a rob...
Yawen Wei, Zhen Yu, Yong Guan