Sciweavers

6907 search results - page 343 / 1382
» Securing distributed adaptation
Sort
View
JOC
2000
181views more  JOC 2000»
15 years 4 months ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern
119
Voted
P2P
2005
IEEE
15 years 10 months ago
Heterogeneity-Aware Distributed Access Structure
Efficient access to distributed and dynamic multidimensional data is vital for applications in large, heterogeneous, decentralised, resource-sharing environments such as Grids an...
Alejandra González Beltrán, Peter Mi...
125
Voted
ICEIS
2003
IEEE
15 years 10 months ago
Code Generation for Distributed Systems
d graphically, interest in code generators which create applications based on abstract system descriptions, is high. An indicator for this are the many commercial products. This pa...
Markus Aleksy, Ralf Gitzel
WETICE
2003
IEEE
15 years 10 months ago
Knowledge Management for Distributed Agile Processes: Models, Techniques, and Infrastructure
This report summarizes presentations and discussions of the IEEE WETICE 2003 Workshop on Knowledge Management for Distributed Agile Processes. The main goals of the workshop were ...
Harald Holz, Grigori Melnik, Martin Schaaf
SBCCI
2003
ACM
113views VLSI» more  SBCCI 2003»
15 years 10 months ago
Tangram - Virtual Integration of Heterogeneous IP Components in a Distributed Co-Simulation Environment
IP reuse is essential in embedded SoC design. IP components may be described in different modeling languages and present heterogeneous interfaces. The Tangram environment supports...
Uilian Rafael Feijo Souza, Josue Klafke Sperb, Bra...