Results 41 to 50 of about 120,111 (165)
A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computing
In the VANET systems, the leakage of some sensitive data or communication information will cause heavy losses for life and property. Then, a higher security level is required in the VANET systems.
Zhijun Wei +3 more
doaj +1 more source
A metaobject architecture for fault-tolerant distributed systems : the FRIENDS approach [PDF]
The FRIENDS system developed at LAAS-CNRS is a metalevel architecture providing libraries of metaobjects for fault tolerance, secure communication, and group-based distributed applications.
Fabre, Jean-Charles, Pérennou, Tanguy
core +2 more sources
Virtual Shareholder Meetings [PDF]
Electronic communication impacts how widely-held corporations conduct shareholder meetings. For example, technology has facilitated such options as electronic proxy voting, remote electronic voting, and virtual meetings.
Boros, Elizabeth
core +1 more source
Re-assessing the radial-velocity evidence for planets around CoRoT-7
CoRoT-7 is an 11th magnitude K-star whose light curve shows transits with depth of 0.3 mmag and a period of 0.854 d, superimposed on variability at the 1% level, due to the modulation of evolving active regions with the star's 23 d rotation period.
Aigrain +52 more
core +1 more source
Estimate solar contribution to the global surface warming using the ACRIM TSI satellite composite
We study, by using a wavelet decomposition methodology, the solar signature on global surface temperature data using the ACRIM total solar irradiance satellite composite by Willson and Mordvinov.
B. J. West +11 more
core +1 more source
An Efficient Short Blind Proxy Re-signatures Scheme
Abstract The existing proxy re-signature schemes have drawbacks in terms of privacy protection and signature efficiency. Our scheme is based on the proxy re-signature scheme, which combines the main idea of short blind signature and proposes the definition of short blind proxy re-signature scheme.
Xiaodong Yang +4 more
openaire +1 more source
The mosquito Aedes aegypti is the main vector of several arthropod-borne diseases that have global impacts. In a previous meta-analysis, our group identified a vector gene set containing 110 genes strongly associated with infections of dengue, West Nile ...
Eduardo Fukutani +7 more
doaj +1 more source
Due to increasing complexity and heterogeneity of applications the importance of efficient algorithms is increasing day by day. The size of the input is increasing.
Deepak Garg
doaj +1 more source
RAFDA: A Policy-Aware Middleware Supporting the Flexible Separation of Application Logic from Distribution [PDF]
Middleware technologies often limit the way in which object classes may be used in distributed applications due to the fixed distribution policies that they impose.
Dearle, Alan +4 more
core +1 more source
Trust Implications of DDoS Protection in Online Elections
Online elections make a natural target for distributed denial of service attacks. Election agencies wary of disruptions to voting may procure DDoS protection services from a cloud provider.
Culnane, Chris +3 more
core +1 more source

