Sciweavers

297 search results - page 27 / 60
» join 2008
Sort
View
IJSN
2008
114views more  IJSN 2008»
14 years 11 months ago
Adaptive clustering for scalable key management in dynamic group communications
: Group key management has received a particular attention, these last years, in both academic and industry research communities. This is due to the economical relevance of group-b...
Yacine Challal, Said Gharout, Abdelmadjid Bouabdal...
JCM
2008
74views more  JCM 2008»
14 years 11 months ago
Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures
Publicly verifiable secret sharing (PVSS) allows not only shareholders themselves but also everyone verify the shares of a secret distributed by a dealer. It has a lot of electroni...
Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li, Guowen L...
JFP
2008
75views more  JFP 2008»
14 years 11 months ago
Exploiting reachability and cardinality in higher-order flow analysis
t two complementary improvements for abstract-interpretation-based flow analysis r-order languages: (1) abstract garbage collection and (2) abstract counting.1,2 garbage collecti...
Matthew Might, Olin Shivers
JSW
2008
95views more  JSW 2008»
14 years 11 months ago
Architecture Support for Behavior-based Adaptive Checkpointing
Checkpointing is a commonly used approach to provide system fault-tolerance. However, using a constant checkpointing frequency may compromise the system's overall performance ...
Nianen Chen, Shangping Ren
CAGD
2004
76views more  CAGD 2004»
14 years 11 months ago
Mesh quality improvement and other properties in the four-triangles longest-edge partition
The four-triangles longest-edge (4T-LE) partition of a triangle t is obtained by joining the midpoint of the longest edge of t to the opposite vertex and to the midpoints of the t...
Angel Plaza, José P. Suárez, Miguel ...