Sciweavers

5149 search results - page 894 / 1030
» Timed Asynchronous Distributed Systems
Sort
View
136
Voted
INDOCRYPT
2004
Springer
15 years 8 months ago
New ID-Based Threshold Signature Scheme from Bilinear Pairings
ID-based public key systems allow the user to use his/her identity as the public key, which can simplify key management procedure compared with CA-based public key systems. However...
Xiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, ...
109
Voted
SIGMETRICS
2003
ACM
101views Hardware» more  SIGMETRICS 2003»
15 years 8 months ago
Effects of clock resolution on the scheduling of interactive and soft real-time processes
It is commonly agreed that scheduling mechanisms in general purpose operating systems do not provide adequate support for modern interactive applications, notably multimedia appli...
Yoav Etsion, Dan Tsafrir, Dror G. Feitelson
144
Voted
CAISE
2003
Springer
15 years 8 months ago
Hybrid Publish-Subscribe: A Compromise Approach for Large-Scale
Abstract. The purpose of this article is to propose a scalable, topologically and traffic-wise self-adapting approach to a publish/subscribe paradigm for supporting event-based app...
Roman Szarowski
119
Voted
EICS
2009
ACM
15 years 7 months ago
Adapting ubicomp software and its evaluation
We describe work in progress on tools and infrastructure to support adaptive component-based software for mobile devices— in our case, Apple iPhones. Our high level aim is ‘de...
Malcolm Hall, Marek Bell, Alistair Morrison, Stuar...
127
Voted
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
15 years 7 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider