Sciweavers

297 search results - page 27 / 60
» join 2008
Sort
View
IJSN
2008
114views more  IJSN 2008»
14 years 9 months ago
Adaptive clustering for scalable key management in dynamic group communications
: Group key management has received a particular attention, these last years, in both academic and industry research communities. This is due to the economical relevance of group-b...
Yacine Challal, Said Gharout, Abdelmadjid Bouabdal...
JCM
2008
74views more  JCM 2008»
14 years 9 months ago
Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures
Publicly verifiable secret sharing (PVSS) allows not only shareholders themselves but also everyone verify the shares of a secret distributed by a dealer. It has a lot of electroni...
Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li, Guowen L...
JFP
2008
75views more  JFP 2008»
14 years 9 months ago
Exploiting reachability and cardinality in higher-order flow analysis
t two complementary improvements for abstract-interpretation-based flow analysis r-order languages: (1) abstract garbage collection and (2) abstract counting.1,2 garbage collecti...
Matthew Might, Olin Shivers
60
Voted
JSW
2008
95views more  JSW 2008»
14 years 9 months ago
Architecture Support for Behavior-based Adaptive Checkpointing
Checkpointing is a commonly used approach to provide system fault-tolerance. However, using a constant checkpointing frequency may compromise the system's overall performance ...
Nianen Chen, Shangping Ren
93
Voted
CAGD
2004
76views more  CAGD 2004»
14 years 9 months ago
Mesh quality improvement and other properties in the four-triangles longest-edge partition
The four-triangles longest-edge (4T-LE) partition of a triangle t is obtained by joining the midpoint of the longest edge of t to the opposite vertex and to the midpoints of the t...
Angel Plaza, José P. Suárez, Miguel ...