Sciweavers

273 search results - page 27 / 55
» Mutually Independent Commitments
Sort
View
CNSR
2008
IEEE
123views Communications» more  CNSR 2008»
15 years 4 months ago
Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios
Secure communications in UWB based on cryptographic keys generated from channel measurements without a trusted third party have been developed. The fine time resolution of UWB al...
Masoud Ghoreishi Madiseh, Michael L. McGuire, Step...
71
Voted
IPPS
1999
IEEE
15 years 1 months ago
The Computational Co-op: Gathering Clusters into a Metacomputer
We explore the creation of a metacomputer by the aggregation of independent sites. Joining a metacomputer is voluntary, and hence it has to be an endeavor that mutually benefits a...
Walfredo Cirne, Keith Marzullo
SC
1994
ACM
15 years 1 months ago
Truly distribution-independent algorithms for the N-body problem
The N - body problem is to simulate the motion of N particles under the influence of mutual force fields based on an inverse square law. Greengard's algorithm claims to compu...
Srinivas Aluru, Gurpur M. Prabhu, John L. Gustafso...
FC
2000
Springer
106views Cryptology» more  FC 2000»
15 years 1 months ago
Capability-Based Financial Instruments
Every novel cooperative arrangement of mutually suspicious parties interacting electronically -- every smart contract -- effectively requires a new cryptographic protocol. However,...
Mark S. Miller, Chip Morningstar, Bill Frantz
VLDB
1995
ACM
130views Database» more  VLDB 1995»
15 years 1 months ago
Improving Performance in Replicated Databases through Relaxed Coherency
Applications in finance and telecommunications (intelligent network, network management, mobile computing) cause renewed interest in distributed and replicated data management. Si...
Rainer Gallersdörfer, Matthias Nicola