Sciweavers

1273 search results - page 159 / 255
» Recovery from
Sort
View
142
Voted
EUROSYS
2006
ACM
15 years 8 months ago
Fireflies: scalable support for intrusion-tolerant network overlays
This paper describes and evaluates Fireflies, a scalable protocol for supporting intrusion-tolerant network overlays.1 While such a protocol cannot distinguish Byzantine nodes fro...
Håvard D. Johansen, André Allavena, R...
149
Voted
FSE
2006
Springer
124views Cryptology» more  FSE 2006»
15 years 8 months ago
Cryptanalysis of Grain
Abstract. Grain [11] is a lightweight stream cipher submitted by M. Hell, T. Johansson, and W. Meier to the eSTREAM call for stream cipher proposals of the European project ECRYPT ...
Côme Berbain, Henri Gilbert, Alexander Maxim...
ACSC
2001
IEEE
15 years 8 months ago
Starting with Termination: A Methodology for Building Distributed Garbage Collection Algorithms
We propose an effective methodology in which a distributed garbage collector may be derived from a distributed termination algorithm and a centralized garbage collector in a manne...
Stephen M. Blackburn, J. Eliot B. Moss, Richard L....
135
Voted
ICRA
1995
IEEE
125views Robotics» more  ICRA 1995»
15 years 8 months ago
Inductive Generation of Diagnostic Knowledge for Autonomous Assembly
A generic architecture for evolutive supervision of robotized assembly tasks is presented. This architecture , at different levels of abstraction, functions for dispatching action...
Luís Seabra Lopes, Luis M. Camarinha-Matos
ASIACRYPT
2008
Springer
15 years 7 months ago
A New Attack on the LEX Stream Cipher
Abstract. In [6], Biryukov presented a new methodology of stream cipher design, called leak extraction. The stream cipher LEX, based on this methodology and on the AES block cipher...
Orr Dunkelman, Nathan Keller