Sciweavers

264 search results - page 37 / 53
» Bounding the number of tolerable faults in majority-based sy...
Sort
View
79
Voted
CCGRID
2001
IEEE
15 years 1 months ago
XtremWeb: A Generic Global Computing System
Global Computing achieves high throughput computing by harvesting a very large number of unused computing resources connected to the Internet. This parallel computing model target...
Gilles Fedak, Cécile Germain, Vincent N&eac...
94
Voted
DAC
2010
ACM
15 years 1 months ago
LUT-based FPGA technology mapping for reliability
As device size shrinks to the nanometer range, FPGAs are increasingly prone to manufacturing defects. We anticipate that the ability to tolerate multiple defects will be very impo...
Jason Cong, Kirill Minkovich
EUROCRYPT
2010
Springer
15 years 2 months ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...
ACSW
2006
14 years 10 months ago
A simplified approach to web service development
Most languages used for developing web services and clients exhibit properties which make calling remote functions across a network a non-trivial task. The type systems used by ob...
Peter M. Kelly, Paul D. Coddington, Andrew L. Wend...
HYBRID
2011
Springer
13 years 9 months ago
Reputation-based networked control with data-corrupting channels
We examine the problem of reliable networked control when the communication channel between the controller and the actuator periodically drops packets and is faulty i.e., corrupts...
Shreyas Sundaram, Jian Chang, Krishna K. Venkatasu...