Sciweavers

110 search results - page 2 / 22
» A Limitation of Vector Timestamps for Reconstructing Distrib...
Sort
View
CONCUR
2008
Springer
13 years 7 months ago
Modeling Computational Security in Long-Lived Systems
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
DAC
1998
ACM
14 years 6 months ago
Maximum Power Estimation Using the Limiting Distributions of Extreme Order Statistics
In this paper we present a statistical method for estimating the maximum power consumption in VLSI circuits. The method is based on the theory of extreme order statistics applied ...
Qinru Qiu, Qing Wu, Massoud Pedram
SSS
2010
Springer
118views Control Systems» more  SSS 2010»
13 years 3 months ago
Modeling and Analyzing Periodic Distributed Computations
The earlier work on predicate detection has assumed that the given computation is finite. Detecting violation of a liveness predicate requires that the predicate be evaluated on a...
Anurag Agarwal, Vijay K. Garg, Vinit A. Ogale
NETGAMES
2004
ACM
13 years 10 months ago
Accuracy in dead-reckoning based distributed multi-player games
Distributed multi-player games use dead reckoning vectors to intimate other (at a distance) participating players about the movement of any entity by a controlling player. The dea...
Sudhir Aggarwal, Hemant Banavar, Amit Khandelwal, ...
TIT
2008
141views more  TIT 2008»
13 years 5 months ago
Dimensionality Reduction for Distributed Estimation in the Infinite Dimensional Regime
Distributed estimation of an unknown signal is a common task in sensor networks. The scenario usually envisioned consists of several nodes, each making an observation correlated wi...
Olivier Roy, Martin Vetterli