Sciweavers

12373 search results - page 202 / 2475
» Semi-Logarithmic Number Systems
Sort
View
93
Voted
ACNS
2006
Springer
81views Cryptology» more  ACNS 2006»
15 years 6 months ago
A Handy Multi-coupon System
A coupon is an electronic data that represents the right to access a service provided by a service provider (e.g. gift certificates or movie tickets). Recently, a privacyprotectin...
Sébastien Canard, Aline Gouget, Emeline Huf...
69
Voted
ICDCSW
2005
IEEE
15 years 6 months ago
State Checksum and Its Role in System Stabilization
Although a self-stabilizing system that suffers from a transient fault is guaranteed to converge to a legitimate state after a finite number of steps, the convergence can be slow ...
Chin-Tser Huang, Mohamed G. Gouda
88
Voted
INFOCOM
2005
IEEE
15 years 6 months ago
SCOPE: scalable consistency maintenance in structured P2P systems
— While current Peer-to-Peer (P2P) systems facilitate static file sharing, newly-developed applications demand that P2P systems be able to manage dynamically-changing files. Ma...
Xin Chen, Shansi Ren, Haining Wang, Xiaodong Zhang
112
Voted
RTSS
2005
IEEE
15 years 6 months ago
Decentralized Utilization Control in Distributed Real-Time Systems
Many real-time systems must control their CPU utilizations in order to meet end-to-end deadlines and prevent overload. Utilization control is particularly challenging in distribut...
Xiaorui Wang, Dong Jia, Chenyang Lu, Xenofon D. Ko...
ACSAC
2003
IEEE
15 years 6 months ago
An Intrusion-Tolerant Password Authentication System
In a password-based authentication system, to authenticate a user, a server typically stores password verification data (PVD), which is a value derived from the user’s password...
Xunhua Wang, Mohammad Hossain Heydari, Hua Lin