Sciweavers

1447 search results - page 274 / 290
» Simulating Internet Worms
Sort
View
EAGC
2003
Springer
15 years 2 months ago
Decentralized vs. Centralized Economic Coordination of Resource Allocation in Grids
Application layer networks are software architectures that allow the provisioning of services requiring a huge amount of resources by connecting large numbers of individual compute...
Torsten Eymann, Michael Reinicke, Oscar Ardaiz, Pa...
EUROCRYPT
2003
Springer
15 years 2 months ago
Resettable Zero-Knowledge in the Weak Public-Key Model
A new public-key model for resettable zero-knowledge (rZK) protocols, which is an extension and generalization of the upper-bounded public-key (UPK) model introduced by Micali and ...
Yunlei Zhao, Xiaotie Deng, Chan H. Lee, Hong Zhu
ICANN
2003
Springer
15 years 2 months ago
The Acquisition of New Categories through Grounded Symbols: An Extended Connectionist Model
Abstract. Solutions to the symbol grounding problem, in psychologically plausible cognitive models, have been based on hybrid connectionist/symbolic architectures, on robotic appro...
Alberto Greco, Thomas Riga, Angelo Cangelosi
CLOUD
2010
ACM
15 years 2 months ago
RACS: a case for cloud storage diversity
The increasing popularity of cloud storage is leading organizations to consider moving data out of their own data centers and into the cloud. However, success for cloud storage pr...
Hussam Abu-Libdeh, Lonnie Princehouse, Hakim Weath...
ICNP
2002
IEEE
15 years 2 months ago
QoS Extension to BGP
To enable the end-to-end Quality of Service (QoS) guarantees in the Internet, based on the Border Gateway Protocol (BGP), inter-domain QoS advertising and routing are important. H...
Li Xiao, King-Shan Lui, Jun Wang, Klara Nahrstedt