Sciweavers

332 search results - page 66 / 67
» Hypercubic Sorting Networks
Sort
View
EUROSYS
2009
ACM
13 years 9 months ago
Effective and efficient compromise recovery for weakly consistent replication
Weakly consistent replication of data has become increasingly important both for loosely-coupled collections of personal devices and for large-scale infrastructure services. Unfor...
Prince Mahajan, Ramakrishna Kotla, Catherine C. Ma...
EUROCRYPT
2008
Springer
13 years 7 months ago
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
The Universal Composability framework was introduced by Canetti to study the security of protocols which are concurrently executed with other protocols in a network environment. U...
Nishanth Chandran, Vipul Goyal, Amit Sahai
BMCBI
2006
109views more  BMCBI 2006»
13 years 5 months ago
A computational approach to discovering the functions of bacterial phytochromes by analysis of homolog distributions
Background: Phytochromes are photoreceptors, discovered in plants, that control a wide variety of developmental processes. They have also been found in bacteria and fungi, but for...
Tilman Lamparter
CN
2006
84views more  CN 2006»
13 years 5 months ago
Distributed mechanism in detecting and defending against the low-rate TCP attack
In this paper, we consider a distributed mechanism to detect and to defend against the low-rate TCP attack. The low-rate TCP attack is a recently discovered attack. In essence, it ...
Haibin Sun, John C. S. Lui, David K. Y. Yau
REPLICATION
2010
13 years 3 months ago
A History of the Virtual Synchrony Replication Model
In this chapter, we discuss a widely used fault-tolerant data replication model called virtual synchrony. The model responds to two kinds of needs. First, there is the practical qu...
Ken Birman