Sciweavers

1599 search results - page 116 / 320
» Probabilistic Analysis of Anonymity
Sort
View
77
Voted
COLCOM
2005
IEEE
15 years 4 months ago
Providing both scale and security through a single core probabilistic protocol
Distributed systems are typically designed for scale and performance first, which makes it difficult to add security later without affecting the original properties. This paper ...
Ramsés Morales, Indranil Gupta
INFOCOM
2003
IEEE
15 years 4 months ago
Route Driven Gossip: Probabilistic Reliable Multicast in Ad Hoc Networks
Abstract— Traditionally, reliable multicast protocols are deterministic in nature. It is precisely this determinism that tends to become their limiting factor when aiming at reli...
Jun Luo, Patrick Th. Eugster, Jean-Pierre Hubaux
FOCS
1999
IEEE
15 years 3 months ago
A Probabilistic Algorithm for k-SAT and Constraint Satisfaction Problems
We present a simple probabilistic algorithm for solving kSAT, and more generally, for solving constraint satisfaction problems (CSP). The algorithm follows a simple localsearch pa...
Uwe Schöning
FMCAD
2004
Springer
15 years 2 months ago
Bloom Filters in Probabilistic Verification
Abstract. Probabilistic techniques for verification of finite-state transition systems offer huge memory savings over deterministic techniques. The two leading probabilistic scheme...
Peter C. Dillinger, Panagiotis Manolios
APSEC
2007
IEEE
15 years 25 days ago
An Approach to Probabilistic Effort Estimation for Military Avionics Software Maintenance by Considering Structural Characterist
The needs of software maintenance and the importance of maintenance project management increase rapidly in the military avionics industry. Although few previous studies related to...
Tae-Hoon Song, Kyung-A Yoon, Doo-Hwan Bae