Sciweavers

6907 search results - page 1126 / 1382
» Securing distributed adaptation
Sort
View
LISA
1994
15 years 16 days ago
The Group Administration Shell and the GASH Network Computing Environment
Managing large scale UNIX networks so that users can use resources on multiple systems is traditionally performed using NIS, NFS, and DNS. Proper use of these tools requires exact...
Jonathan Abbey
USENIX
1994
15 years 16 days ago
Key Management in an Encrypting File System
As distributed computing systems grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes i...
Matt Blaze
SIGCOMM
2010
ACM
14 years 11 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
IOR
2006
192views more  IOR 2006»
14 years 11 months ago
Exact Simulation of Stochastic Volatility and Other Affine Jump Diffusion Processes
The stochastic differential equations for affine jump diffusion models do not yield exact solutions that can be directly simulated. Discretization methods can be used for simulati...
Mark Broadie, Özgür Kaya
ISI
2006
Springer
14 years 11 months ago
Tracing the Event Evolution of Terror Attacks from On-Line News
Since the September 11th terror attack at New York in 2001, the frequency of terror attacks around the world has been increasing and it draws more attention of the public. On Janua...
Christopher C. Yang, Xiaodong Shi, Chih-Ping Wei
« Prev « First page 1126 / 1382 Last » Next »