Sciweavers

7971 search results - page 44 / 1595
» On unbounded operators and applications
Sort
View
81
Voted
ICDCSW
2003
IEEE
15 years 6 months ago
Convergence of IPsec in Presence of Resets
IPsec is the current security standard for the Internet Protocol IP. According to this standard, a selected computer pair (p, q) in the Internet can be designated a “security ass...
Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy
124
Voted
VL
1991
IEEE
183views Visual Languages» more  VL 1991»
15 years 4 months ago
The Conceptual Programming Environment, CP: Reasoning Representation using Graph Structures and Operations
The Conceptual Programming environment, CP, being developed at the Computing Research Laboratory (CRL), is a complete knowledge representation visual programming environment for u...
Heather Pfeiffer, Roger T. Hartley
IJHPCA
2008
88views more  IJHPCA 2008»
15 years 22 days ago
Extending Grid-Based Workflow Tools With Patterns/Operators
Many Grid applications involve combining computational and data access components into complex workflows. A distinction is generally made between mechanisms to compose components ...
Maria Cecilia Gomes, Omer F. Rana, José C. ...
ISI
2004
Springer
15 years 6 months ago
Privacy-Preserving Inter-database Operations
Abstract. We present protocols for distributed computation of relational intersections and equi-joins such that each site gains no information about the tuples at the other site th...
Gang Liang, Sudarshan S. Chawathe
89
Voted
IPPS
2002
IEEE
15 years 5 months ago
Disconnected Operations in Mobile Environments
The execution of distributed applications involving mobile terminals and fixed servers connected by wireless links raises the need for handling network disconnections, both invol...
Denis Conan, Sophie Chabridon, Guy Bernard