Sciweavers

6907 search results - page 193 / 1382
» Securing distributed adaptation
Sort
View
EUROCRYPT
2004
Springer
15 years 8 months ago
Short Signatures Without Random Oracles
We describe a short signature scheme that is strongly existentially unforgeable under an adaptive chosen message attack in the standard security model. Our construction works in g...
Dan Boneh, Xavier Boyen
IPPS
2000
IEEE
15 years 7 months ago
Repartitioning Unstructured Adaptive Meshes
We present a new parallel repartitioning algorithm for adaptive finite-element meshes that significantly reduces the amount of data that needs to move between processors in orde...
José G. Castaños, John E. Savage
HPDC
2003
IEEE
15 years 8 months ago
Using Views for Customizing Reusable Components in Component-Based Frameworks
Increasingly, scalable distributed applications are being constructed by integrating reusable components spanning multiple administrative domains. Dynamic composition and deployme...
Anca-Andreea Ivan, Vijay Karamcheti
CBSE
2004
Springer
15 years 8 months ago
Correctness of Component-Based Adaptation
Abstract. Long running applications often need to adapt due to changing requirements or changing environment. Typically, such adaptation is performed by dynamically adding or remov...
Sandeep S. Kulkarni, Karun N. Biyani
COLCOM
2009
IEEE
15 years 8 months ago
The PEI framework for application-centric security
This paper motivates the fundamental importance of application context for security. It then gives an overview of the PEI framework for application-centric security and outlines s...
Ravi S. Sandhu