Sciweavers

526 search results - page 40 / 106
» Towards the Verifying Compiler
Sort
View
IJAMC
2008
84views more  IJAMC 2008»
14 years 9 months ago
Towards an authentication service for Peer-to-Peer based Massively Multiuser Virtual Environments
Abstract-- In this paper we propose a distributed authentication service for peer-to-peer (P2P) based massively multiuser virtual environments. Such a service is necessary to provi...
Arno Wacker, Gregor Schiele, Sebastian Schuster, T...
PERCOM
2010
ACM
14 years 7 months ago
Towards automated verification of autonomous networks: A case study in self-configuration
In autonomic networks, the self-configuration of network entities is one of the most desirable properties. In this paper, we show how formal verification techniques can verify the ...
JaeSeung Song, Tiejun Ma, Peter R. Pietzuch
I3E
2009
127views Business» more  I3E 2009»
14 years 7 months ago
Not All Adware Is Badware: Towards Privacy-Aware Advertising
Abstract. Online advertising is a major economic force in the Internet today. A basic goal of any advertising system is to accurately target the ad to the recipient audience. While...
Hamed Haddadi, Saikat Guha, Paul Francis
FGCN
2008
IEEE
125views Communications» more  FGCN 2008»
15 years 4 months ago
Coordinating System Software for Power Savings
Power consumption is becoming a primary concern as a result of tremendous increasing in computer power usage. Innumerable methods and techniques have been exploited to address thi...
Lingxiang Xiang, Jiangwei Huang, Tianzhou Chen
CRYPTO
2003
Springer
96views Cryptology» more  CRYPTO 2003»
15 years 3 months ago
Scalable Protocols for Authenticated Group Key Exchange
We consider the fundamental problem of authenticated group key exchange among n parties within a larger and insecure public network. A number of solutions to this problem have bee...
Jonathan Katz, Moti Yung