Sciweavers

804 search results - page 32 / 161
» On the Termination of the Chase Algorithm
Sort
View
106
Voted
CORR
2010
Springer
100views Education» more  CORR 2010»
14 years 8 months ago
Secret Key Generation for a Pairwise Independent Network Model
Abstract— We investigate secret key generation for a “pairwise independent network” model in which every pair of terminals observes correlated sources which are independent o...
Sirin Nitinawarat, Chunxuan Ye, Alexander Barg, Pr...
71
Voted
CORR
2010
Springer
100views Education» more  CORR 2010»
14 years 8 months ago
A New Proof of the F5 Algorithm
The F5 algorithm is presented by Faug`ere in 2002. However, Faug`ere have not provide the rigorous proofs so far. In this paper, we will give a new complete proof and hence reveal ...
Yao Sun, Dingkang Wang
EDBTW
2004
Springer
15 years 3 months ago
A Distributed Algorithm for Robust Data Sharing and Updates in P2P Database Networks
In this paper we thoroughly analyze a distributed procedure for the problem of local database update in a network of database peers, useful for data exchange scenarios. The algorit...
Enrico Franconi, Gabriel M. Kuper, Andrei Lopatenk...
89
Voted
FOCS
2008
IEEE
15 years 4 months ago
Algorithms for Single-Source Vertex Connectivity
In the Survivable Network Design Problem (SNDP) the goal is to find a minimum cost subset of edges that satisfies a given set of pairwise connectivity requirements among the ver...
Julia Chuzhoy, Sanjeev Khanna
94
Voted
SIAMCOMP
1998
98views more  SIAMCOMP 1998»
14 years 10 months ago
Failure Detection and Randomization: A Hybrid Approach to Solve Consensus
We present a consensus algorithm that combines unreliable failure detection and randomization, two well-known techniques for solving consensus in asynchronous systems with crash f...
Marcos Kawazoe Aguilera, Sam Toueg