Sciweavers

3052 search results - page 57 / 611
» Weakly Distributive Domains
Sort
View
ISICT
2003
14 years 11 months ago
Analysis of a mobile communication security protocol
: Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle de...
Tom Coffey, Reiner Dojen
JSC
2006
85views more  JSC 2006»
14 years 9 months ago
Fraction-free row reduction of matrices of Ore polynomials
In this paper we give formulas for performing row reduction of a matrix of Ore polynomials in a fraction-free way. The reductions can be used for finding the rank and left nullspa...
Bernhard Beckermann, Howard Cheng, George Labahn
FAST
2004
14 years 11 months ago
Segank: A Distributed Mobile Storage System
This paper presents a distributed mobile storage system designed for storage elements connected by a network of non-uniform quality. Flexible data placement is crucial, and it lea...
Sumeet Sobti, Nitin Garg, Fengzhou Zheng, Junwen L...
GCC
2003
Springer
15 years 3 months ago
Research and Application of Distributed Fusion System Based on Grid Computing
Grid computing is used to realize the connection of distributed, heterogeneous computing resources through grid, assist in accomplishing computing task. Focusing on the weakness of...
Yu Su, Hai Zhao, Wei-ji Su, Gang Wang, Xiao-dan Zh...
COOPIS
2004
IEEE
15 years 1 months ago
Classification and Analysis of Distributed Event Filtering Algorithms
Publish/subscribe middleware provides efficient support for loosely coupled communication in distributed systems. A number of different distributed message-filtering algorithms hav...
Sven Bittner, Annika Hinze