Sciweavers

522 search results - page 20 / 105
» What's a Typical Commit
Sort
View
CRYPTO
2004
Springer
162views Cryptology» more  CRYPTO 2004»
14 years 2 months ago
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Masayuki Abe, Serge Fehr
CEC
2009
IEEE
14 years 3 days ago
The coevolution of loyalty and cooperation
— Humans are inclined to engage in long-lasting relationships whose stability does not only rely on cooperation, but often also on loyalty — our tendency to keep interacting wi...
Sven Van Segbroeck, Francisco C. Santos, Ann Now&e...
ISCA
2005
IEEE
117views Hardware» more  ISCA 2005»
14 years 2 months ago
Store Vulnerability Window (SVW): Re-Execution Filtering for Enhanced Load Optimization
The load-store unit is a performance critical component of a dynamically-scheduled processor. It is also a complex and non-scalable component. Several recently proposed techniques...
Amir Roth
NDSS
2005
IEEE
14 years 2 months ago
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments
In this paper, we present an approach for realizing a safe execution environment (SEE) that enables users to “try out” new software (or configuration changes to existing soft...
Weiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan,...
ICDE
2010
IEEE
228views Database» more  ICDE 2010»
14 years 8 months ago
Strongly consistent replication for a bargain
Strong consistency is an important correctness property for replicated databases. It ensures that each transaction accesses the latest committed database state as provided in centr...
Konstantinos Krikellas, Sameh Elnikety, Zografoula...