Sciweavers

4305 search results - page 640 / 861
» Analysing Protocol Implementations
Sort
View
ISADS
1999
IEEE
15 years 8 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
CONCUR
1999
Springer
15 years 8 months ago
From Synchrony to Asynchrony
Abstract. We present an in-depth discussion of the relationships between synchrony and asynchrony. Simple models of both paradigms are presented, and we state theorems which guaran...
Albert Benveniste, Benoît Caillaud, Paul Le ...
SRDS
1999
IEEE
15 years 8 months ago
CosNamingFT - A Fault-Tolerant CORBA Naming Service
This paper describes the design and implementation of a fault-tolerant CORBA naming service - CosNamingFT. Every CORBA object is accessed through its Interoperable Object Referenc...
Lau Cheuk Lung, Joni da Silva Fraga, Jean-Marie Fa...
ICDCS
1997
IEEE
15 years 8 months ago
Dynamic Light-Weight Groups
The virtual synchrony model for group communication has proven to be a powerful paradigm for building distributed applications. In applications that use a large number of groups, ...
Katherine Guo, Luís Rodrigues
INFOCOM
1997
IEEE
15 years 8 months ago
IP Multicasting for Point-to-Point Local Distribution
While support for IP multicasting continues to spread enabling new applications, an increasing number of hosts connects to the worldwide Internet via low bandwidth Point-toPoint l...
George Xylomenos, George C. Polyzos