Sciweavers

191 search results - page 27 / 39
» Machine Reading
Sort
View
TCC
2007
Springer
93views Cryptology» more  TCC 2007»
14 years 1 months ago
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
Abstract. We construct an intrusion-resilient symmetric-key authenticated key exchange (AKE) protocol in the bounded retrieval model. The model employs a long shared private key to...
David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke L...
IUI
2006
ACM
14 years 1 months ago
Posture and activity silhouettes for self-reporting, interruption management, and attentive interfaces
In this paper we present a novel system for monitoring a computer user’s posture and activities in front of the computer (e.g., reading, speaking on the phone, etc.) for self-re...
Alejandro Jaimes
SAC
2006
ACM
14 years 1 months ago
Revisiting 1-copy equivalence in clustered databases
Recently renewed interest in scalable database systems for shared nothing clusters has been supported by replication protocols based on group communication that are aimed at seaml...
Rui Carlos Oliveira, José Pereira, Alfr&aci...
ISCA
2003
IEEE
144views Hardware» more  ISCA 2003»
14 years 27 days ago
Half-Price Architecture
Current-generation microprocessors are designed to process instructions with one and two source operands at equal cost. Handling two source operands requires multiple ports for ea...
Ilhyun Kim, Mikko H. Lipasti
DSN
2002
IEEE
14 years 17 days ago
Small Byzantine Quorum Systems
In this paper we present two protocols for asynchronous Byzantine Quorum Systems (BQS) built on top of reliable channels—one for self-verifying data and the other for any data. ...
Jean-Philippe Martin, Lorenzo Alvisi, Michael Dahl...