Sciweavers

Share
147 search results - page 1 / 30
» Near-perfect Token Distribution
Sort
View
MSS
2008
IEEE
88views Hardware» more  MSS 2008»
8 years 12 months ago
Cubical token systems
The paper deals with combinatorial and stochastic structures of cubical token systems. A cubical token system is an instance of a token system, which in turn is an instance of a t...
Sergei Ovchinnikov
CCS
2015
ACM
3 years 7 months ago
TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens
Two-factor authentication has been widely used due to the vulnerabilities associated with traditional text-based password. One-time password (OTP) plays an indispensable role on a...
He Sun, Kun Sun, Yuewu Wang, Jiwu Jing
AINA
2008
IEEE
9 years 6 months ago
Multi-Token Distributed Mutual Exclusion Algorithm
This paper is a contribution to the inception of multiple tokens in solving distributed mutual exclusion problem. The proposed algorithm is based on the token ring approach and al...
Md. Abdur Razzaque, Choong Seon Hong
SIGSOFT
2007
ACM
10 years 19 days ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek
INFOCOM
2012
IEEE
7 years 2 months ago
Maximizing throughput when achieving time fairness in multi-rate wireless LANs
Abstract—This paper focuses on designing a distributed medium access control algorithm that aims at achieving time fairness among contending stations and throughput maximization ...
Yuan Le, Liran Ma, Wei Cheng, Xiuzhen Cheng, Biao ...
books