Search

Your search keyword '"Delegation (computing)"' showing total 254 results

Search Constraints

Start Over You searched for: Descriptor "Delegation (computing)" Remove constraint Descriptor: "Delegation (computing)"
254 results on '"Delegation (computing)"'

Search Results

1. A Queueing Game Based Management Framework for Fog Computing With Strategic Computing Speed Control

2. Deadlock Freedom for Asynchronous and Cyclic Process Networks

3. Towards reducing delegation overhead in replication-based verification: An incentive-compatible rational delegation computing scheme

4. Too little and too much authority sharing: Differential relationships with psychological empowerment and in‐role and extra‐role performance

5. OAUTH 2.0 IN SECURING APIS

6. An Optimised Flow for Futures: From Theory to Practice

7. Enabling self-verifiable mutable content items in IPFS using Decentralized Identifiers

8. Impossibility of blind quantum sampling for classical client

9. Key regression from constrained pseudorandom functions

10. Feasibility of Nurse Consultation in Oral Tumor Therapy: A Web-Based Survey among Physicians and Nonmedical Specialists

11. Directed Digital Signature on Isogenies of Elliptic Curves

12. Flexible and Efficient Verifiable Computation on Encrypted Data

13. Lattice-Based HRA-secure Attribute-Based Proxy Re-Encryption in Standard Model

14. Interfaces, Delegation and Enumerated Types

15. WLCG Token Usage and Discovery

16. PERAN KEPEMIMPINAN DI LEMBAGA PENDIDIKAN ISLAM

17. VSDM: A Virtual Service Device Management Scheme for UPnP-Based IoT Networks

18. Cooperative Game Model of Delegation Computing: Verifier Separated from Calculators

19. Polyglot and Distributed Software Repository Mining with Crossflow

20. Design of a symbolically executable embedded hypervisor

21. Effects of home-based pelvic floor muscle training on decreasing symptoms of stress urinary incontinence and improving the quality of life of urban adult Omani women: A randomized controlled single-blind study

22. Fluent Session Programming in C#

23. Transciphering, Using FiLIP and TFHE for an Efficient Delegation of Computation

24. OAuth 2.0 Token Exchange

25. Delegation with Updatable Unambiguous Proofs and PPAD-Hardness

26. Rational Delegation Computing Using Information Theory and Game Theory Approach

27. Metadata Driven Data Management in Distributed Computing Environments with Partial or Complete Lack of Trust between User Groups

28. UMKESS: user-oriented multi-group key establishments using secret sharing

29. Identifier discrimination: realizing selective-ID HIBE with authorized delegation and dedicated encryption privacy

30. Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs

31. Scalable and Soundness Verifiable Outsourcing Computation in Marine Mobile Computing

32. CASA‐IoT: Scalable and context‐aware IoT access control supporting multiple users

33. Asynchronous timed session types: from duality to time-sensitive processes

34. Blockchain-Based Delegation of Rights in Distributed Computing Environment

35. The MacDonald Plan

36. Primary adenoid cystic carcinoma of the trachea with thyroid invasion: a case report and literature review

37. Differentiating Technique: Constructing Efficient HIBE with Constant Size Ciphertext and Authorized Delegation

38. Expérimentation du principe de délégation GPU pour la simulation multiagent. Les boids de Reynolds comme cas d'étude

39. Leveraging Hardware Message Passing for Efficient Thread Synchronization

40. DNS-Based Dynamic Authentication for Microservices in IoT

41. Universal Witness Signatures

42. A Multi-client Dynamic Searchable Symmetric Encryption System with Physical Deletion

43. La consultation infirmière dans un centre d’urgence pédiatrique universitaire suisse

44. Assembling the unexpected inspiration–from linking to jigsaw

45. Congenital dislocation of the knee at birth – Part I: Clinical signs and classification

46. Organization and Delivery of Scholarly Communications Services by Academic and Research Libraries in the United Kingdom: Observations from Across the Pond

47. Defining a Methodology Based on GPU Delegation for Developing MABS Using GPGPU

48. IoT-Cloud Authorization and Delegation Mechanisms for Ubiquitous Sensing and Actuation

49. CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient

50. Reliability-centric analysis of offloaded computation in cooperative wearable applications

Catalog

Books, media, physical & digital resources