Sciweavers

2472 search results - page 79 / 495
» Parallel Key Exchange
Sort
View
CCS
2005
ACM
15 years 6 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin
99
Voted
ISPDC
2005
IEEE
15 years 6 months ago
Parallel Jess
Distributed or parallel rule-based systems are currently needed for real applications. The proposed architecture of such a system is based on a wrapper allowing the cooperation bet...
Dana Petcu
79
Voted
ICRA
2003
IEEE
88views Robotics» more  ICRA 2003»
15 years 6 months ago
A new concept of modular parallel mechanism for machining applications
The subject of this paper is the design of a new concept of modular parallel mechanisms for three, four or five-axis machining applications. Most parallel mechanisms are designed ...
Damien Chablat, Philippe Wenger
CLEIEJ
2000
91views more  CLEIEJ 2000»
15 years 19 days ago
Low Cost Cluster Architectures for Parallel and Distributed Processing
Cluster based architectures are standing out in the last years as an alternative for the construction of versatile, low cost parallel machines. This versatility permits their use ...
Giancarlo C. Mai, César A. F. De Rose
95
Voted
QUESTA
2008
73views more  QUESTA 2008»
15 years 8 days ago
Optimal control of parallel server systems with many servers in heavy traffic
We consider a parallel server system that consists of several customer classes and server pools in parallel. We propose a simple robust control policy to minimize the total linear...
J. G. Dai, Tolga Tezcan