Sciweavers

832 search results - page 74 / 167
» Effect of Malicious Synchronization
Sort
View
ACL
2009
13 years 7 months ago
Optimizing Word Alignment Combination For Phrase Table Training
Combining word alignments trained in two translation directions has mostly relied on heuristics that are not directly motivated by intended applications. We propose a novel method...
Yonggang Deng, Bowen Zhou
CDC
2010
IEEE
105views Control Systems» more  CDC 2010»
13 years 5 months ago
Weakly pulse-coupled oscillators: Heterogeneous delays lead to homogeneous phase
This paper studies the effect of heterogenous delays in networks of weakly pulse-coupled identical oscillators. We develop a new framework to study them by constructing a non-delay...
Enrique Mallada, Ao Tang
TCC
2009
Springer
132views Cryptology» more  TCC 2009»
14 years 10 months ago
Authenticated Adversarial Routing
: The aim of this paper is to demonstrate the feasibility of authenticated throughput-ecient routing in an unreliable and dynamically changing synchronous network in which the majo...
Yair Amir, Paul Bunn, Rafail Ostrovsky
ICDCN
2011
Springer
13 years 1 months ago
Load Balanced Scalable Byzantine Agreement through Quorum Building, with Full Information
We address the problem of designing distributed algorithms for large scale networks that are robust to Byzantine faults. We consider a message passing, full information model: the ...
Valerie King, Steven Lonargan, Jared Saia, Amitabh...
ICNP
2006
IEEE
14 years 4 months ago
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks
— In a wormhole attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual link under attacker control. Proposed countermeasures to t...
Jakob Eriksson, Srikanth V. Krishnamurthy, Michali...