Sciweavers

12373 search results - page 202 / 2475
» Semi-Logarithmic Number Systems
Sort
View
127
Voted
ACNS
2006
Springer
81views Cryptology» more  ACNS 2006»
15 years 11 months ago
A Handy Multi-coupon System
A coupon is an electronic data that represents the right to access a service provided by a service provider (e.g. gift certificates or movie tickets). Recently, a privacyprotectin...
Sébastien Canard, Aline Gouget, Emeline Huf...
ICDCSW
2005
IEEE
15 years 10 months ago
State Checksum and Its Role in System Stabilization
Although a self-stabilizing system that suffers from a transient fault is guaranteed to converge to a legitimate state after a finite number of steps, the convergence can be slow ...
Chin-Tser Huang, Mohamed G. Gouda
INFOCOM
2005
IEEE
15 years 10 months ago
SCOPE: scalable consistency maintenance in structured P2P systems
— While current Peer-to-Peer (P2P) systems facilitate static file sharing, newly-developed applications demand that P2P systems be able to manage dynamically-changing files. Ma...
Xin Chen, Shansi Ren, Haining Wang, Xiaodong Zhang
RTSS
2005
IEEE
15 years 10 months ago
Decentralized Utilization Control in Distributed Real-Time Systems
Many real-time systems must control their CPU utilizations in order to meet end-to-end deadlines and prevent overload. Utilization control is particularly challenging in distribut...
Xiaorui Wang, Dong Jia, Chenyang Lu, Xenofon D. Ko...
117
Voted
ACSAC
2003
IEEE
15 years 10 months ago
An Intrusion-Tolerant Password Authentication System
In a password-based authentication system, to authenticate a user, a server typically stores password verification data (PVD), which is a value derived from the user’s password...
Xunhua Wang, Mohammad Hossain Heydari, Hua Lin