Sciweavers

5722 search results - page 977 / 1145
» Security Function Interactions
Sort
View
157
Voted
SCN
2004
Springer
123views Communications» more  SCN 2004»
15 years 8 months ago
On the Key Exposure Problem in Chameleon Hashes
Chameleon signatures were introduced by Krawczyk and Rabin, being non-interactive signature schemes that provide non-transferability. However, that first construction employs a c...
Giuseppe Ateniese, Breno de Medeiros
135
Voted
UPP
2004
Springer
15 years 8 months ago
Grassroots Approach to Self-management in Large-Scale Distributed Systems
Abstract. Traditionally, autonomic computing is envisioned as replacing the human factor in the deployment, administration and maintenance of computer systems that are ever more co...
Özalp Babaoglu, Márk Jelasity, Alberto...
139
Voted
AUIC
2003
IEEE
15 years 8 months ago
Non-invasive Adaptation of Black-box User Interfaces
In this paper a new method for the non-invasive adaptation of user interfaces is presented. The main idea is not to implement the user interface toolkit as an API, but instead as ...
Dirc Rose, Simon Stegmaier, Guido Reina, Daniel We...
109
Voted
C5
2003
IEEE
15 years 8 months ago
Croquet - A Collaboration System Architecture
1 Croquet [18] is a computer software architecture built from the ground up with a focus on deep collaboration between teams of users. It is a totally open, totally free, highly p...
David A. Smith, Alan C. Kay, Andreas Raab, David P...
124
Voted
CLUSTER
2003
IEEE
15 years 8 months ago
From Clusters to the Fabric: The Job Management Perspective
Clusters provide an outstanding cost/performance ratio, but their efficient orchestration, i.e. their cooperative management, maintenance, and use, still poses difficulties. Mor...
Thomas Röblitz, Florian Schintke, Alexander R...