: Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle de...
In this paper we give formulas for performing row reduction of a matrix of Ore polynomials in a fraction-free way. The reductions can be used for finding the rank and left nullspa...
This paper presents a distributed mobile storage system designed for storage elements connected by a network of non-uniform quality. Flexible data placement is crucial, and it lea...
Grid computing is used to realize the connection of distributed, heterogeneous computing resources through grid, assist in accomplishing computing task. Focusing on the weakness of...
Yu Su, Hai Zhao, Wei-ji Su, Gang Wang, Xiao-dan Zh...
Publish/subscribe middleware provides efficient support for loosely coupled communication in distributed systems. A number of different distributed message-filtering algorithms hav...