Sciweavers

2522 search results - page 2 / 505
» Tokenized Interaction Architecture
Sort
View
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
13 years 12 months ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...
EUROPAR
2008
Springer
13 years 6 months ago
The Impact of Clustering on Token-Based Mutual Exclusion Algorithms
We present in this article a theoretical study and performance results about the impact of the Grid architecture on token-based mutual exclusion algorithms. To this end, both the o...
Julien Sopena, Luciana Arantes, Fabrice Legond-Aub...
ENTCS
2006
111views more  ENTCS 2006»
13 years 4 months ago
Token-Passing Nets: Call-by-Need for Free
Recently, encodings in interaction nets of the call-by-name and call-by-value strategies of the -calculus have been proposed. The purpose of these encodings was to he gap between ...
François-Régis Sinot
HICSS
2003
IEEE
140views Biometrics» more  HICSS 2003»
13 years 10 months ago
Token Dispensers for GSS Race Conditions: Locking Things That Don't Exist
A technological challenge that distinguishes group support systems (GSS) from many other technologies is the need to accommodate a variety of race conditions. A race condition occ...
Robert O. Briggs, Tomas P. Gregory
HRI
2009
ACM
13 years 11 months ago
Situated messages for asynchronous human-robot interaction
An ongoing issue in human robot interaction (HRI) is how people and robots communicate with one another. While there is considerable work in real-time human-robot communication, f...
Nicolai Marquardt, James Everett Young, Ehud Sharl...