Sciweavers

213 search results - page 26 / 43
» The Computational and Storage Potential of Volunteer Computi...
Sort
View
SAC
2009
ACM
15 years 6 months ago
Where are your manners?: Sharing best community practices in the web 2.0
The Web 2.0 fosters the creation of communities by offering users a wide array of social software tools. While the success of these tools is based on their ability to support diff...
Angelo Di Iorio, Davide Rossi, Fabio Vitali, Stefa...
CCS
2007
ACM
15 years 6 months ago
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing
We construct two new multiparty digital signature schemes that allow multiple signers to sequentially produce a compact, fixed-length signature. First, we introduce a new primiti...
Alexandra Boldyreva, Craig Gentry, Adam O'Neill, D...
WMASH
2004
ACM
15 years 5 months ago
Proximity services supporting network virtual memory in mobile devices
Wireless networked embedded terminals like personal digital assistants, cell-phones or sensor nodes are typically memory constrained devices. This limitation prevents the developm...
Emanuele Lattanzi, Andrea Acquaviva, Alessandro Bo...
GRID
2003
Springer
15 years 5 months ago
Applying Database Support for Large Scale Data Driven Science in Distributed Environments
There is a rapidly growing set of applications, referred to as data driven applications, in which analysis of large amounts of data drives the next steps taken by the scientist, e...
Sivaramakrishnan Narayanan, Ümit V. Ça...
PKC
1999
Springer
91views Cryptology» more  PKC 1999»
15 years 4 months ago
A Secure Pay-per View Scheme for Web-Based Video Service
With the development of high speed computer networks, video service on the Web has huge market potential in that the video service can be provided to subscribers with greater time ...
Jianying Zhou, Kwok-Yan Lam