Sciweavers

484 search results - page 19 / 97
» Guessing Games and Distributed Computations in Synchronous N...
Sort
View
ICDCS
2005
IEEE
15 years 3 months ago
Virtual Leashing: Internet-Based Software Piracy Protection
Software-splitting is a technique for protecting software from piracy by removing code fragments from an application and placing them on a remote trusted server. The server provid...
Ori Dvir, Maurice Herlihy, Nir Shavit
PODC
2004
ACM
15 years 3 months ago
Gradient clock synchronization
We introduce the distributed gradient clock synchronization problem. As in traditional distributed clock synchronization, we consider a network of nodes equipped with hardware clo...
Rui Fan, Nancy A. Lynch
ICDCSW
2005
IEEE
15 years 3 months ago
Capacity Estimation of Non-Synchronous Covert Channels
Capacity estimation is an important part of covert channel analysis. It measures the severity of a covert channel by estimating the maximum information rate attainable over it. Tr...
Zhenghong Wang, Ruby B. Lee
MIDDLEWARE
2005
Springer
15 years 3 months ago
Improving flexibility on host discovery for pervasive computing middlewares
The vision of pervasive or ubiquitous computing, conceived by Mark Weiser, foresees a world where computing is embedded in every day objects. Such objects interact with each other...
Emerson Loureiro, Loreno Oliveira, Hyggo Oliveira ...
CDC
2010
IEEE
135views Control Systems» more  CDC 2010»
14 years 4 months ago
Synchronous rendezvous of very-low-range wireless agents
In this paper, we address the problem of temporal synchronization of a team of mobile agents on a set of rendezvous points defined by the nodes of a bipartite network. In particula...
Michael M. Zavlanos