Sciweavers

1490 search results - page 252 / 298
» The Logic of Authentication Protocols
Sort
View
FGCS
2008
147views more  FGCS 2008»
15 years 23 days ago
QoS-based dissemination of content in Grids
This paper proposes a bio-inspired approach tailored to the construction of a Grid information system in which content, specifically metadata descriptors that specify the characte...
Agostino Forestiero, Carlo Mastroianni, Giandomeni...
115
Voted
IGPL
2010
117views more  IGPL 2010»
14 years 10 months ago
Executable specification of open multi-agent systems
Multi-agent systems where the agents are developed by parties with competing interests, and where there is no access to an agent's internal state, are often classified as `ope...
Alexander Artikis, Marek J. Sergot
118
Voted
JAVA
2001
Springer
15 years 5 months ago
A scalable, robust network for parallel computing
CX, a network-based computational exchange, is presented. The system’s design integrates variations of ideas from other researchers, such as work stealing, non-blocking tasks, e...
Peter R. Cappello, Dimitros Mourloukos
115
Voted
CCS
2009
ACM
16 years 1 months ago
Hidden credential retrieval from a reusable password
We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access ...
Xavier Boyen
WISEC
2009
ACM
15 years 7 months ago
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
Recent studies show that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network congestion, higher reliability, and ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru