Sciweavers

1116 search results - page 145 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
DSN
2002
IEEE
14 years 24 days ago
Secure Intrusion-tolerant Replication on the Internet
This paper describes a Secure INtrusion-Tolerant Replication Architecture1 (SINTRA) for coordination in asynchronous networks subject to Byzantine faults. SINTRA supplies a number...
Christian Cachin, Jonathan A. Poritz
CSDA
2006
92views more  CSDA 2006»
13 years 7 months ago
Robust measures of tail weight
The kurtosis coefficient is often regarded as a measure of the tail heaviness of a distribution relative to that of the normal distribution. However, it also measures the peakedne...
Guy Brys, Mia Hubert, Anja Struyf
TIP
2008
168views more  TIP 2008»
13 years 7 months ago
A Real-Time Algorithm for the Approximation of Level-Set-Based Curve Evolution
Abstract--In this paper, we present a complete and practical algorithm for the approximation of level-set-based curve evolution suitable for real-time implementation. In particular...
Yonggang Shi, William Clement Karl
JUCS
2000
117views more  JUCS 2000»
13 years 7 months ago
The Light Control Case Study: Problem Description
: This document contains a range of needs and requirements concerning the construction of a light control system for a floor of a university building. A description of the building...
Stefan Queins, Gerhard Zimmermann, Martin Becker, ...
SIAMCOMP
2000
74views more  SIAMCOMP 2000»
13 years 7 months ago
On Quiescent Reliable Communication
We study the problem of achieving reliable communication with quiescent algorithms (i.e., algorithms that eventually stop sending messages) in asynchronous systems with process cra...
Marcos Kawazoe Aguilera, Wei Chen, Sam Toueg