Sciweavers

EUROCRYPT
2005
Springer
13 years 10 months ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...
OSDI
2008
ACM
14 years 4 months ago
SALSA: Analyzing Logs as StAte Machines
SALSA examines system logs to derive state-machine views of the sytem's execution, along with control-flow, data-flow models and related statistics. Exploiting SALSA's d...
Jiaqi Tan, Xinghao Pan, Soila Kavulya, Rajeev Gand...
STOC
2003
ACM
90views Algorithms» more  STOC 2003»
14 years 4 months ago
Work-competitive scheduling for cooperative computing with dynamic groups
The problem of cooperatively performing a set of t tasks in a decentralized setting where the computing medium is subject to failures is one of the fundamental problems in distrib...
Chryssis Georgiou, Alexander Russell, Alexander A....