Sciweavers

3235 search results - page 32 / 647
» Partial Redundant Modeling
Sort
View
ACNS
2005
Springer
167views Cryptology» more  ACNS 2005»
14 years 3 months ago
Identity Based Encryption Without Redundancy
This paper presents a first example of secure identity based encryption scheme (IBE) without redundancy in the sense of Phan and Pointcheval. This modification of the Boneh-Frank...
Benoît Libert, Jean-Jacques Quisquater
ISCA
1993
IEEE
115views Hardware» more  ISCA 1993»
14 years 2 months ago
Parity Logging Overcoming the Small Write Problem in Redundant Disk Arrays
Parity encoded redundant disk arrays provide highly reliable, cost effective secondary storage with high performance for read accesses and large write accesses. Their performance ...
Daniel Stodolsky, Garth A. Gibson, Mark Holland
TSMC
1998
90views more  TSMC 1998»
13 years 9 months ago
Redundancy problem in writing: from human to anthropomorphic robot arm
Abstract—This paper presents the analysis of motion of a redundant anthropomorphic arm during the writing. The modeling is based on the separation of the prescribed movement into...
Veljko Potkonjak, Mirjana Popovic, Mihailo Lazarev...
DATE
2006
IEEE
99views Hardware» more  DATE 2006»
14 years 4 months ago
Parallel co-simulation using virtual synchronization with redundant host execution
In traditional parallel co-simulation approaches, the simulation speed is heavily limited by time synchronization overhead between simulators and idle time caused by data dependen...
Dohyung Kim, Soonhoi Ha, Rajesh Gupta
IWSOS
2009
Springer
14 years 2 months ago
Self-organized Data Redundancy Management for Peer-to-Peer Storage Systems
In peer-to-peer storage systems, peers can freely join and leave the system at any time. Ensuring high data availability in such an environment is a challenging task. In this paper...
Yaser Houri, Manfred Jobmann, Thomas Fuhrmann