In this paper, we describe the design and implementation of a tuple-based distributed memory realized with the use of RFID technology. The key idea – rooted in a more general sc...
— One practical limitation of structured peer-to-peer (P2P) networks is that they are frequently subject to Sybil attacks: malicious parties can compromise the network by generat...
Hosam Rowaihy, William Enck, Patrick McDaniel, Tom...
We introduce a new approach to three important problems in ray tracing: antialiasing, distributed light sources, and fuzzy reflections of lights and other surfaces. For antialias...
Systems that store objects at a large number of sites require fault-tolerant and timely garbage collection. A popular technique is to trace each site independently using inter-sit...
Real algebraic numbers appear in many Computer Algebra pro bJems. For inst ante the determination of a cylindrical algebraic decomposition for an euclidian space requires compu ti...