Sciweavers

535 search results - page 84 / 107
» Do we need dependent types
Sort
View
129
Voted
WINET
2002
124views more  WINET 2002»
15 years 3 months ago
Improving Energy Efficiency of Centrally Controlled Wireless Data Networks
Wireless network access protocols can assist nodes to conserve energy by identifying when they can enter low energy states. The goal is to put all nodes not involved in a transmiss...
John A. Stine, Gustavo de Veciana
144
Voted
SAC
2006
ACM
15 years 9 months ago
Proactive resilience through architectural hybridization
In a recent work, we have shown that it is not possible to dependably build any type of distributed f fault or intrusiontolerant system under the asynchronous model. This result f...
Paulo Sousa, Nuno Ferreira Neves, Paulo Verí...
128
Voted
IPPS
2005
IEEE
15 years 9 months ago
Fault-Tolerant Parallel Applications with Dynamic Parallel Schedules
Commodity computer clusters are often composed of hundreds of computing nodes. These generally off-the-shelf systems are not designed for high reliability. Node failures therefore...
Sebastian Gerlach, Roger D. Hersch
129
Voted
ECAI
2010
Springer
15 years 4 months ago
ANTIPA: an agent architecture for intelligent information assistance
Abstract. Human users trying to plan and accomplish informationdependent goals in highly dynamic environments with prevalent uncertainty must consult various types of information s...
Jean Oh, Felipe Meneguzzi, Katia P. Sycara
142
Voted
FC
2007
Springer
158views Cryptology» more  FC 2007»
15 years 9 months ago
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
Aggelos Kiayias, Hong-Sheng Zhou