Sciweavers

1116 search results - page 145 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
106
Voted
DSN
2002
IEEE
15 years 5 months ago
Secure Intrusion-tolerant Replication on the Internet
This paper describes a Secure INtrusion-Tolerant Replication Architecture1 (SINTRA) for coordination in asynchronous networks subject to Byzantine faults. SINTRA supplies a number...
Christian Cachin, Jonathan A. Poritz
92
Voted
CSDA
2006
92views more  CSDA 2006»
15 years 19 days ago
Robust measures of tail weight
The kurtosis coefficient is often regarded as a measure of the tail heaviness of a distribution relative to that of the normal distribution. However, it also measures the peakedne...
Guy Brys, Mia Hubert, Anja Struyf
119
Voted
TIP
2008
168views more  TIP 2008»
15 years 15 days ago
A Real-Time Algorithm for the Approximation of Level-Set-Based Curve Evolution
Abstract--In this paper, we present a complete and practical algorithm for the approximation of level-set-based curve evolution suitable for real-time implementation. In particular...
Yonggang Shi, William Clement Karl
116
Voted
JUCS
2000
117views more  JUCS 2000»
15 years 12 days ago
The Light Control Case Study: Problem Description
: This document contains a range of needs and requirements concerning the construction of a light control system for a floor of a university building. A description of the building...
Stefan Queins, Gerhard Zimmermann, Martin Becker, ...
SIAMCOMP
2000
74views more  SIAMCOMP 2000»
15 years 11 days ago
On Quiescent Reliable Communication
We study the problem of achieving reliable communication with quiescent algorithms (i.e., algorithms that eventually stop sending messages) in asynchronous systems with process cra...
Marcos Kawazoe Aguilera, Wei Chen, Sam Toueg