Sciweavers

495 search results - page 46 / 99
» Signed quorum systems
Sort
View
IPPS
2002
IEEE
15 years 4 months ago
Utilization-Based Heuristics for Statically Mapping Real-Time Applications onto the HiPer-D Heterogeneous Computing System
Real-time applications continue to increase in importance as they are employed in various critical areas, such as command and control systems. These applications have traditionall...
Shoukat Ali, Jong-Kook Kim, Yang Yu, Shriram B. Gu...
WDAG
2010
Springer
218views Algorithms» more  WDAG 2010»
14 years 10 months ago
Anonymous Asynchronous Systems: The Case of Failure Detectors
Abstract: Due the multiplicity of loci of control, a main issue distributed systems have to cope with lies in the uncertainty on the system state created by the adversaries that ar...
François Bonnet, Michel Raynal
IACR
2011
129views more  IACR 2011»
13 years 11 months ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter
IFIP
2001
Springer
15 years 4 months ago
Semiotics and Intelligent Control
The overall purpose of this paper is to demonstrate the relevance of semiotics concepts to the analysis of intelligent control systems. Semiotics has only a minor impact on resear...
Morten Lind
CVPR
2001
IEEE
16 years 1 months ago
An Adaptive Algorithm for Text Detection from Natural Scenes
We present a new adaptive algorithm for automatic detection of text from a natural scene. The initial cues of text regions are first detected from the captured image/video. An ada...
Jiang Gao, Jie Yang