Sciweavers

1045 search results - page 107 / 209
» The Use of Exceptions
Sort
View
FC
2008
Springer
82views Cryptology» more  FC 2008»
13 years 10 months ago
Quantifying Resistance to the Sybil Attack
Sybil attacks have been shown to be unpreventable except under the protection of a vigilant central authority. We use an economic analysis to show quantitatively that some applicat...
N. Boris Margolin, Brian Neil Levine
WSC
1997
13 years 9 months ago
A Simulation-Based Backward Planning Approach for Order-Release
The problem of order release planning for a make-toorder production facility is addressed. Traditionally, order-release planning in a multi-stage shop is performed with material r...
Edward F. Watson, Deborah J. Medeiros, Randall P. ...
ICCV
2005
IEEE
14 years 10 months ago
Geometric Invariants and Applications under Catadioptric Camera Model
This paper presents geometric invariants of points and their applications under central catadioptric camera model. Although the image has severe distortions under the model, we es...
Yihong Wu, Zhanyi Hu
WDAG
1995
Springer
103views Algorithms» more  WDAG 1995»
13 years 11 months ago
Self-Stabilization of Wait-Free Shared Memory Objects
This paper proposes a general definition of self-stabilizing wait-free shared memory objects. The definition ensures that, even in the face of processor failures, every executio...
Jaap-Henk Hoepman, Marina Papatriantafilou, Philip...
MSN
2007
Springer
192views Sensor Networks» more  MSN 2007»
14 years 2 months ago
Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks
We have developed a self-healing key distribution scheme for secure multicast group communications for wireless sensor network environment. We present a strategy for securely distr...
Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ash...