Sciweavers

2522 search results - page 2 / 505
» Tokenized Interaction Architecture
Sort
View
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
15 years 4 months ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...
EUROPAR
2008
Springer
14 years 11 months ago
The Impact of Clustering on Token-Based Mutual Exclusion Algorithms
We present in this article a theoretical study and performance results about the impact of the Grid architecture on token-based mutual exclusion algorithms. To this end, both the o...
Julien Sopena, Luciana Arantes, Fabrice Legond-Aub...
ENTCS
2006
111views more  ENTCS 2006»
14 years 9 months ago
Token-Passing Nets: Call-by-Need for Free
Recently, encodings in interaction nets of the call-by-name and call-by-value strategies of the -calculus have been proposed. The purpose of these encodings was to he gap between ...
François-Régis Sinot
HICSS
2003
IEEE
140views Biometrics» more  HICSS 2003»
15 years 2 months ago
Token Dispensers for GSS Race Conditions: Locking Things That Don't Exist
A technological challenge that distinguishes group support systems (GSS) from many other technologies is the need to accommodate a variety of race conditions. A race condition occ...
Robert O. Briggs, Tomas P. Gregory
78
Voted
HRI
2009
ACM
15 years 4 months ago
Situated messages for asynchronous human-robot interaction
An ongoing issue in human robot interaction (HRI) is how people and robots communicate with one another. While there is considerable work in real-time human-robot communication, f...
Nicolai Marquardt, James Everett Young, Ehud Sharl...