Sciweavers

8499 search results - page 52 / 1700
» cans 2009
Sort
View
PODC
2009
ACM
14 years 11 months ago
Vertical paxos and primary-backup replication
We introduce a class of Paxos algorithms called Vertical Paxos, in which reconfiguration can occur in the middle of reaching agreement on an individual state-machine command. Vert...
Leslie Lamport, Dahlia Malkhi, Lidong Zhou
TCC
2009
Springer
114views Cryptology» more  TCC 2009»
14 years 11 months ago
Predicate Privacy in Encryption Systems
Predicate encryption is a new encryption paradigm which gives a master secret key owner fine-grained control over access to encrypted data. The master secret key owner can generat...
Emily Shen, Elaine Shi, Brent Waters
ICDCS
2009
IEEE
14 years 8 months ago
Fault-Tolerant Consensus in Unknown and Anonymous Networks
This paper investigates under which conditions information can be reliably shared and consensus can be solved in unknown and anonymous message-passing networks that suffer from cr...
Carole Delporte-Gallet, Hugues Fauconnier, Andreas...
PEPM
2009
ACM
14 years 8 months ago
Linear logical approximations
ract interpretation of programs relates the exact semantics of a programming language to an approximate semantics that can be effectively computed. We show that, by specifying ope...
Robert J. Simmons, Frank Pfenning
CICLING
2009
Springer
14 years 5 months ago
Semantic-Based Temporal Text-Rule Mining
Abstract. In many contexts today, documents are available in a number of versions. In addition to explicit knowledge that can be queried/searched in documents, these documents also...
Kjetil Nørvåg, Ole Kristian Fivelstad