Sciweavers

329 search results - page 43 / 66
» The Dangers of Replication and a Solution
Sort
View
EUROCRYPT
1999
Springer
15 years 6 months ago
Distributed Pseudo-random Functions and KDCs
Abstract. This work describes schemes for distributing between n servers the evaluation of a function f which is an approximation to a random function, such that only authorized su...
Moni Naor, Benny Pinkas, Omer Reingold
OPODIS
2003
15 years 3 months ago
Emulating Shared-Memory Do-All Algorithms in Asynchronous Message-Passing Systems
A fundamental problem in distributed computing is performing a set despite failures and delays. Stated abstractly, the problem is to perform N tasks using P failure-prone processor...
Dariusz R. Kowalski, Mariam Momenzadeh, Alexander ...
BSN
2009
IEEE
145views Sensor Networks» more  BSN 2009»
15 years 8 months ago
Accurate, Fast Fall Detection Using Gyroscopes and Accelerometer-Derived Posture Information
—Falls are dangerous for the aged population as they can adversely affect health. Therefore, many fall detection systems have been developed. However, prevalent methods only use ...
Qiang Li, John A. Stankovic, Mark A. Hanson, Adam ...
RECONFIG
2009
IEEE
172views VLSI» more  RECONFIG 2009»
15 years 8 months ago
Combined SCA and DFA Countermeasures Integrable in a FPGA Design Flow
Abstract—The main challenge when implementing cryptographic algorithms in hardware is to protect them against attacks that target directly the device. Two strategies are customar...
Shivam Bhasin, Jean-Luc Danger, Florent Flament, T...
ICRA
2006
IEEE
225views Robotics» more  ICRA 2006»
15 years 7 months ago
Constraint Optimization Coordination Architecture for Search and Rescue Robotics
— The dangerous and time sensitive nature of a disaster area makes it an ideal application for robotic exploration. Our long term goal is to enable humans, software agents, and a...
Mary Koes, Illah R. Nourbakhsh, Katia P. Sycara