Sciweavers

13987 search results - page 112 / 2798
» The Two Guards Problem
Sort
View
145
Voted
EUROCRYPT
2003
Springer
15 years 8 months ago
Two-Threshold Broadcast and Detectable Multi-party Computation
Classical distributed protocols like broadcast or multi-party computation provide security as long as the number of malicious players f is bounded by some given threshold t, i.e., ...
Matthias Fitzi, Martin Hirt, Thomas Holenstein, J&...
FUN
2010
Springer
293views Algorithms» more  FUN 2010»
15 years 8 months ago
Computational Complexity of Two-Dimensional Platform Games
Abstract. We analyze the computational complexity of various twodimensional platform games. We identify common properties of these games that allow us to state several meta-theorem...
Michal Forisek
SENSYS
2009
ACM
15 years 8 months ago
A tale of two synchronizing clocks
A specific application for wastewater monitoring and actuation, called CSOnet, deployed city-wide in a mid-sized US city, South Bend, Indiana, posed some challenges to a time syn...
Jinkyu Koo, Rajesh Krishna Panta, Saurabh Bagchi, ...
160
Voted
CRYPTO
2008
Springer
186views Cryptology» more  CRYPTO 2008»
15 years 5 months ago
Communication Complexity in Algebraic Two-Party Protocols
In cryptography, there has been tremendous success in building various two-party protocols with small communication complexity out of homomorphic semantically-secure encryption sc...
Rafail Ostrovsky, William E. Skeith III
148
Voted
SPLC
2000
15 years 4 months ago
Two Novel Concepts for systematic product line development
: Framelets and implementation cases are new concepts to manage the complexity of product line development. Framelets are "small product lines" that address, as self-stan...
Alessandro Pasetti, Wolfgang Pree