Sciweavers

495 search results - page 61 / 99
» Signed quorum systems
Sort
View
ISCAPDCS
2004
15 years 1 months ago
R-Chain: A Self-Maintained Reputation Management System in P2P Networks
Trust management is a critical component in P2P file sharing systems due to the free riding and security problem. In this paper, we propose a lightweight reputation management sys...
Lintao Liu, Shu Zhang, Kyung Dong Ryu, Partha Dasg...
VTC
2007
IEEE
15 years 6 months ago
A Novel Timing and Frequency Offset Estimation Scheme for OFDM Systems
— A novel structure of training symbol is proposed for orthogonal frequency division multiplexing (OFDM) systems. With the proposed training symbol, which has repeated sample blo...
Shun-Sheng Wang, Chih-Peng Li, Chin-Liang Wang
AP2PC
2005
Springer
15 years 5 months ago
Incentive-Compatibility in a Distributed Autonomous Currency System
Peer-to-peer complementary currencies can be powerful tools for promoting exchanges and building sustainable relationships among selfish peers on the Internet. i-WAT[10] is a prop...
Kenji Saito, Eiichi Morino, Jun Murai
FATES
2004
Springer
15 years 5 months ago
Testing Deadlock-Freeness in Real-Time Systems: A Formal Approach
A Time Action Lock is a state of a Real-time system at which neither time can progress nor an action can occur. Time Action Locks are often seen as signs of errors in the model or ...
Behzad Bordbar, Kozo Okano
PERCOM
2007
ACM
15 years 11 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...