Sciweavers

1185 search results - page 162 / 237
» Coupon replication systems
Sort
View
CANS
2009
Springer
132views Cryptology» more  CANS 2009»
14 years 2 months ago
Fully Robust Tree-Diffie-Hellman Group Key Exchange
We extend the well-known Tree-Diffie-Hellman technique used for the design of group key exchange (GKE) protocols with robustness, i.e. with resistance to faults resulting from poss...
Timo Brecher, Emmanuel Bresson, Mark Manulis
COOPIS
2004
IEEE
14 years 1 months ago
Refresco: Improving Query Performance Through Freshness Control in a Database Cluster
Abstract. We consider the use of a cluster system for managing autonomous databases. In order to improve the performance of read-only queries, we strive to exploit user requirement...
Cécile Le Pape, Stéphane Ganç...
DSN
2004
IEEE
14 years 1 months ago
Efficient Byzantine-Tolerant Erasure-Coded Storage
This paper describes a decentralized consistency protocol for survivable storage that exploits local data versioning within each storage-node. Such versioning enables the protocol...
Garth R. Goodson, Jay J. Wylie, Gregory R. Ganger,...
ISER
2000
Springer
95views Robotics» more  ISER 2000»
14 years 1 months ago
Design and Experiments on a Novel Biomechatronic Hand
: An "ideal" upper limb prosthesis should be perceived as part of the natural body by the amputee and should replicate sensory-motor capabilities of the amputated limb. H...
Paolo Dario, Maria Chiara Carrozza, Silvestro Mice...
MABS
2000
Springer
14 years 1 months ago
Mapping the Envelope of Social Simulation Trajectories
Discovering and studying emergent phenomena are among the most important activities in social research. Replicating this phenomenon in "the lab" using simulation is an i...
Oswaldo Terán, Bruce Edmonds, Steve Wallis