Sciweavers

1833 search results - page 328 / 367
» Mechanized Verification with Sharing
Sort
View
AIMS
2009
Springer
14 years 3 months ago
Evaluation of Sybil Attacks Protection Schemes in KAD
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Thibault Cholez, Isabelle Chrisment, Olivier Festo...
IWANN
2009
Springer
14 years 3 months ago
Easing the Smart Home: Translating Human Hierarchies to Intelligent Environments
Abstract. Ubiquitous computing research have extended traditional environments in the so–called Intelligent Environments. All of them use their capabilities for pursuing their in...
Manuel García-Herranz, Pablo A. Haya, Xavie...
AC
1998
Springer
14 years 3 months ago
The Search for the Holy Grail in Quantum Cryptography
Abstract. In 1982, Bennett and Brassard suggested a new way to provide privacy in long distance communications with security based on the correctness of the basic principles of qua...
Louis Salvail
SIGOPSE
1998
ACM
14 years 3 months ago
Goal-oriented programming, or composition using events, or threads considered harmful
with this, the thread abstraction was introduced. While threads are handling events, or awaiting specific events, unrelated events can be handled by other threads. Unfortunately, ...
Robbert van Renesse
HOTOS
1993
IEEE
14 years 3 months ago
Object Groups May Be Better Than Pages
I argue against trying to solve the problem of clustering objects into disk pages. Instead, I propose that objects be fetched in groups that may be specific to an application or ...
Mark Day