Zobrazeno 1 - 10
of 201
pro vyhledávání: '"Dulay, N."'
Second-layer or off-chain protocols increase the throughput of permissionless blockchains by enabling parties to lock funds into smart-contracts and perform payments through peer-to-peer communication, only resorting to the smart-contracts for protec
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1032::1948b06a74b2e297be708a299f624461
http://hdl.handle.net/10044/1/98668
http://hdl.handle.net/10044/1/98668
This paper introduces the PoSH Consensus protocol, a novel work-in-progress construction for achieving Sybil-resistant Nakamoto-style probabilistic consensus on the contents of a cryptocurrency ledger in a permissionless decentralized network where p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1032::07a5fce133055f4ec210ef128ad69b86
http://hdl.handle.net/10044/1/98665
http://hdl.handle.net/10044/1/98665
Publikováno v:
International Conference on Embedded Wireless Systems and Networks 2018
In this paper we present DejaVu, a novel 3D virtual world co-simulator for ‘visual diffing’ of cyber-physical system deployments in indoor and outdoor environments. Using faster-than-real-time simulation and efficient recording DejaVu can record
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1032::5feda0772a93d9e0f517f87eb83e582b
http://hdl.handle.net/10044/1/58372
http://hdl.handle.net/10044/1/58372
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Lupu, E, Dulay, N, Sloman, M, Sventek, J, Heeps, S, Strowes, S, Twidle, K, Keoh, SL, Schaeffer-Filho, A
Publikováno v:
Concurrency and Computation: Practice and Experience. 20:277-295
Publikováno v:
Managing Large-Scale Service Deployment: 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2008, Samos Island, Greece, September 22-26, 2008, Proceedings, 95-108
STARTPAGE=95;ENDPAGE=108;TITLE=Managing Large-Scale Service Deployment
Managing Large-Scale Service Deployment ISBN: 9783540859994
DSOM
19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management
STARTPAGE=95;ENDPAGE=108;TITLE=Managing Large-Scale Service Deployment
Managing Large-Scale Service Deployment ISBN: 9783540859994
DSOM
19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management
Managing security in distributed systems requires flexible and expressive authorisation models with support for conflict resolution. Models need to be hierarchical but also non-monotonic supporting both positive and negative authorisations. In this p
Publikováno v:
22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security
Data and applications security XXII : 22nd Annual IFIP WG 11.3 working conference on data and applications security, London, UK, July 13-16, 2008 : proceedings), 127-143
STARTPAGE=127;ENDPAGE=143;TITLE=Data and applications security XXII : 22nd Annual IFIP WG 11.3 working conference on data and applications security, London, UK, July 13-16, 2008 : proceedings)
Lecture Notes in Computer Science ISBN: 9783540705666
DBSec
Data and applications security XXII : 22nd Annual IFIP WG 11.3 working conference on data and applications security, London, UK, July 13-16, 2008 : proceedings), 127-143
STARTPAGE=127;ENDPAGE=143;TITLE=Data and applications security XXII : 22nd Annual IFIP WG 11.3 working conference on data and applications security, London, UK, July 13-16, 2008 : proceedings)
Lecture Notes in Computer Science ISBN: 9783540705666
DBSec
Current security mechanisms pose a risk for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b4e8e3af88691e8b1397c317925ff4a6
https://strathprints.strath.ac.uk/35992/1/jcs.pdf
https://strathprints.strath.ac.uk/35992/1/jcs.pdf
Distributed applications are often built from sets of distributed components that must be co-ordinated in order to achieve some global behaviour. The common approach is to use a centralised controller for co-ordination, or occasionally a set of distr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::697b4dbff84ed326685493cdebfcd76b
http://hdl.handle.net/10044/1/95210
http://hdl.handle.net/10044/1/95210
Publikováno v:
Systems Engineering for Autonomous Systems Defence Technology Centre Conference, 2008
Edinburgh, UK
Edinburgh, UK
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1032::75e529e87db82dbbff2eeecf32d355cb
http://hdl.handle.net/10044/1/10266
http://hdl.handle.net/10044/1/10266
Publikováno v:
Component-Based Software Engineering ISBN: 9783540878902
CBSE
Component-Based Software Engineering: 11th International Symposium, CBSE 2008, Karlsruhe, Germany, October 14-17, 2008, Proceedings, 212-229
STARTPAGE=212;ENDPAGE=229;TITLE=Component-Based Software Engineering
CBSE
Component-Based Software Engineering: 11th International Symposium, CBSE 2008, Karlsruhe, Germany, October 14-17, 2008, Proceedings, 212-229
STARTPAGE=212;ENDPAGE=229;TITLE=Component-Based Software Engineering
Sense-and-react applications are characterised by the fact that actuators are able to react to data collected by sensors and change the monitored environment. With the introduction of nodes sporting actuators, Wireless Sensor Networks (WSNs) are bein
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::11a014dcbc33d246a77b11d3a457be90
https://doi.org/10.1007/978-3-540-87891-9_14
https://doi.org/10.1007/978-3-540-87891-9_14