Sciweavers

1906 search results - page 297 / 382
» Dependable Self-Hosting Distributed Systems Using Constraint...
Sort
View
TCC
2009
Springer
132views Cryptology» more  TCC 2009»
16 years 5 months ago
Authenticated Adversarial Routing
: The aim of this paper is to demonstrate the feasibility of authenticated throughput-ecient routing in an unreliable and dynamically changing synchronous network in which the majo...
Yair Amir, Paul Bunn, Rafail Ostrovsky
CF
2007
ACM
15 years 8 months ago
Parallel genomic sequence-search on a massively parallel system
In the life sciences, genomic databases for sequence search have been growing exponentially in size. As a result, faster sequencesearch algorithms to search these databases contin...
Oystein Thorsen, Brian E. Smith, Carlos P. Sosa, K...
SIGGRAPH
1997
ACM
15 years 9 months ago
The haptic display of complex graphical environments
Force feedback coupled with visual display allows people to interact intuitively with complex virtual environments. For this synergy of haptics and graphics to flourish, however, ...
Diego C. Ruspini, Krasimir Kolarov, Oussama Khatib
PDP
2009
IEEE
15 years 11 months ago
Modelling the Internet Delay Space Based on Geographical Locations
Existing approaches for modelling the Internet delay space predict end-to-end delays between two arbitrary hosts as static values. Further, they do not capture the characteristics...
Sebastian Kaune, Konstantin Pussep, Christof Leng,...
ATAL
2005
Springer
15 years 10 months ago
Formalizing and achieving multiparty agreements via commitments
Multiparty agreements often arise in a multiagent system where autonomous agents interact with each other to achieve a global goal. Multiparty agreements are traditionally represe...
Feng Wan, Munindar P. Singh