Sciweavers

7758 search results - page 116 / 1552
» On the Number of Distributive Lattices
Sort
View
ICDCS
1995
IEEE
14 years 1 months ago
A Distributed K-Mutual Exclusion Algorithm
This paper presents a token-based K-mutual exchsion algorithm. The algorithm uses K tokens and a dynamic forest structure for each token. This structure is used to forward token r...
Shailaja Bulgannawar, Nitin H. Vaidya
ICISC
2008
165views Cryptology» more  ICISC 2008»
13 years 11 months ago
Distributed Attribute-Based Encryption
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) allows to encrypt data under an access policy, specified as a logical combination of attributes. Such ciphertexts can be decry...
Sascha Müller 0003, Stefan Katzenbeisser, Cla...
ICECCS
2010
IEEE
161views Hardware» more  ICECCS 2010»
13 years 10 months ago
Model Checking Round-Based Distributed Algorithms
—In the field of distributed computing, there are many round-based algorithms to solve fundamental problems, such as leader election and distributed consensus. Due to the nature...
Xin An, Jun Pang
ICDM
2009
IEEE
162views Data Mining» more  ICDM 2009»
14 years 4 months ago
Accurate Estimation of the Degree Distribution of Private Networks
—We describe an efficient algorithm for releasing a provably private estimate of the degree distribution of a network. The algorithm satisfies a rigorous property of differenti...
Michael Hay, Chao Li, Gerome Miklau, David Jensen
ICASSP
2008
IEEE
14 years 4 months ago
Belief propagation distributed estimation in sensor networks: An optimized energy accuracy tradeoff
The estimation error performance of Gaussian belief propagation based distributed estimation in a large sensor network employing random sleep strategies is explicitly evaluated fo...
John MacLaren Walsh, Phillip A. Regalia