Sciweavers

258 search results - page 50 / 52
» The dynamics of deterministic systems - A survey
Sort
View
PODC
2004
ACM
14 years 4 months ago
Balanced binary trees for ID management and load balance in distributed hash tables
We present a low-cost, decentralized algorithm for ID management in distributed hash tables (DHTs) managed by a dynamic set of hosts. Each host is assigned an ID in the unit inter...
Gurmeet Singh Manku
ICS
2010
Tsinghua U.
14 years 8 months ago
Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature?
Computation in the physical world is restricted by the following spatial locality constraint: In a single unit of time, information can only travel a bounded distance in space. A ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
13 years 8 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
CDC
2010
IEEE
139views Control Systems» more  CDC 2010»
13 years 5 months ago
Communication, convergence, and stochastic stability in self-assembly
Existing work on programmable self assembly has focused on deterministic performance guarantees--stability of desirable states. In particular, for any acyclic target graph a binary...
Michael J. Fox, Jeff S. Shamma
ASPLOS
2012
ACM
12 years 6 months ago
A case for unlimited watchpoints
Numerous tools have been proposed to help developers fix software errors and inefficiencies. Widely-used techniques such as memory checking suffer from overheads that limit thei...
Joseph L. Greathouse, Hongyi Xin, Yixin Luo, Todd ...