Sciweavers

15375 search results - page 355 / 3075
» cans 2008
Sort
View
CORR
2008
Springer
128views Education» more  CORR 2008»
15 years 4 months ago
Fork Sequential Consistency is Blocking
We consider an untrusted server storing shared data on behalf of clients. We show that no storage access protocol can on the one hand preserve sequential consistency and wait-free...
Christian Cachin, Idit Keidar, Alexander Shraer
CORR
2008
Springer
159views Education» more  CORR 2008»
15 years 4 months ago
Stochastic Limit-Average Games are in EXPTIME
The value of a finite-state two-player zero-sum stochastic game with limit-average payoff can be approximated to within in time exponential in a polynomial in the size of the gam...
Krishnendu Chatterjee, Rupak Majumdar, Thomas A. H...
CORR
2008
Springer
81views Education» more  CORR 2008»
15 years 4 months ago
A New Type of Cipher: DICING_csb
: In this paper, we will propose a new type of cipher named DICING_CSB, which come from our previous a synchronous stream cipher DICING. It applies a stream of subkeys and a encryp...
Li an-Ping
CORR
2008
Springer
120views Education» more  CORR 2008»
15 years 4 months ago
Menger's Paths with Minimum Mergings
For an acyclic directed graph with multiple sources and multiple sinks, we prove that one can choose the Menger's paths between the sources and the sinks such that the number...
Guangyue Han
CORR
2008
Springer
73views Education» more  CORR 2008»
15 years 4 months ago
On Information-Theoretic Scaling Laws for Wireless Networks
With the analysis of the hierarchical scheme, the potential influence of the pre-constant in deriving scaling laws is exposed. It is found that a modified hierarchical scheme can ...
Liang-Liang Xie