Sciweavers

6181 search results - page 202 / 1237
» Transactional Cluster Computing
Sort
View
FC
2007
Springer
117views Cryptology» more  FC 2007»
15 years 9 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
ISAS
2005
Springer
15 years 8 months ago
Dependable Distributed Computing Using Free Databases
Abstract. Designing and programming dependable distributed applications is very difficult. Databases provide features like transactions and replication that can help in the impleme...
Christof Fetzer, Trevor Jim
VLDB
2004
ACM
127views Database» more  VLDB 2004»
15 years 8 months ago
Computing Frequent Itemsets Inside Oracle 10G
1 Frequent itemset counting is the first step for most association rule algorithms and some classification algorithms. It is the process of counting the number of occurrences of ...
Wei Li, Ari Mozes
COMPSAC
2004
IEEE
15 years 7 months ago
Services-Oriented Dynamic Reconfiguration Framework for Dependable Distributed Computing
Web services (WS) received significant attention recently because services can be searched, bound, and executed at runtime over the Internet. This paper proposes a dynamic reconfi...
Wei-Tek Tsai, Weiwei Song, Raymond A. Paul, Zhibin...
ATAL
2011
Springer
14 years 3 months ago
A study of computational and human strategies in revelation games
Revelation games are bilateral bargaining games in which agents may choose to truthfully reveal their private information before engaging in multiple rounds of negotiation. They a...
Noam Peled, Ya'akov (Kobi) Gal, Sarit Kraus