Sciweavers

284 search results - page 34 / 57
» Modularity of Completeness Revisited
Sort
View
97
Voted
INFOCOM
2010
IEEE
15 years 1 months ago
Topological Properties Affect the Power of Network Coding in Decentralized Broadcast
—There exists a certain level of ambiguity regarding whether network coding can further improve download performance in P2P content distribution systems, as compared to commonly ...
Di Niu, Baochun Li
234
Voted
CADE
2011
Springer
14 years 2 months ago
Deciding Security for Protocols with Recursive Tests
Abstract. Security protocols aim at securing communications over public networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
119
Voted
EUROMICRO
2006
IEEE
15 years 8 months ago
Real-Time Modelling of Distributed Component-Based Applications
This paper presents a modular modelling methodology to formulate the timing behaviour of real-time distributed component-based applications. It allows to build real-time models of...
Patricia López Martínez, Julio L. Me...
116
Voted
CRYPTO
2012
Springer
223views Cryptology» more  CRYPTO 2012»
13 years 5 months ago
Collusion-Preserving Computation
In collusion-free protocols, subliminal communication is impossible and parties are thus unable to communicate “any information beyond what the protocol allows”. Collusion-fre...
Joël Alwen, Jonathan Katz, Ueli Maurer, Vassi...
237
Voted
ICLP
2009
Springer
16 years 3 months ago
A Language for Large Ensembles of Independently Executing Nodes
We address how to write programs for distributed computing systems in which the network topology can change dynamically. Examples of such systems, which we call ensembles, include ...
Michael P. Ashley-Rollman, Peter Lee, Seth Copen G...