Sciweavers

4045 search results - page 648 / 809
» Special Section on Parallel Distributed Computing and Networ...
Sort
View
GI
2003
Springer
15 years 3 months ago
Byzantine Failures and Security: Arbitrary is not (always) Random
: The Byzantine failure model allows arbitrary behavior of a certain fraction of network nodes in a distributed system. It was introduced to model and analyze the effects of very s...
Felix C. Gärtner
PERCOM
2004
ACM
15 years 9 months ago
Pervasive Authentication Domains for Automatic Pervasive Device Authorization
In a pervasive computing environment, users have many devices that are used to initiate or answer remote service requests, such as obtaining real-time stock quotes, handling corpo...
Reiner Sailer, James Giles
ESAS
2007
Springer
15 years 4 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
DFG
2009
Springer
15 years 4 months ago
A Survey on Approximation Algorithms for Scheduling with Machine Unavailability
In this chapter we present recent contributions in the field of sequential job scheduling on network machines which work in parallel; these are subject to temporary unavailability...
Florian Diedrich, Klaus Jansen, Ulrich M. Schwarz,...
ASAP
2007
IEEE
169views Hardware» more  ASAP 2007»
15 years 4 months ago
Reduced Delay BCD Adder
Financial and commercial applications use decimal data and spend most of their time in decimal arithmetic. Software implementation of decimal arithmetic is typically at least 100 ...
A. A. Bayrakci, A. Akkas