Sciweavers

1273 search results - page 126 / 255
» Recovery from
Sort
View
IACR
2011
115views more  IACR 2011»
12 years 8 months ago
Threshold Encryption into Multiple Ciphertexts
We propose (T, N) multi-ciphertext scheme for symmetric encryption. The scheme encrypts a message into N distinct ciphertexts. The knowledge of the symmetric key allows decryption ...
Martin Stanek
DSRT
2000
IEEE
14 years 22 days ago
A Generic Rollback Manager for Optimistic HLA Simulations
This paper describes the addition of an extra piece of software, a rollback manager, to implement state saving and rollback management for optimistic federates in the High Level A...
Fernando Vardânega, Carlos Maziero
ICIP
2001
IEEE
14 years 10 months ago
Real time trinocular stereo for tele-immersion
Tele-immersion is a technology that augments your space with real-time 3D projections of remote spaces thus facilitating the interaction of people from different places in virtual...
Jane Mulligan, Kostas Daniilidis
CN
2008
163views more  CN 2008»
13 years 8 months ago
Loss-resilient window-based congestion control
This paper addresses the problem of fair allocation of bandwidth resources on lossy channels in hybrid heterogeneous networks. It discusses more particularly the ability of window...
Christophe De Vleeschouwer, Pascal Frossard
ICSE
2008
IEEE-ACM
14 years 9 months ago
Juzi: a tool for repairing complex data structures
This paper describes Juzi, a tool for automatic repair of complex data structures. Juzi takes a Java class representing the data structure as well as a predicate method that speci...
Bassem Elkarablieh, Sarfraz Khurshid