Sciweavers

8499 search results - page 52 / 1700
» cans 2009
Sort
View
PODC
2009
ACM
16 years 1 months ago
Vertical paxos and primary-backup replication
We introduce a class of Paxos algorithms called Vertical Paxos, in which reconfiguration can occur in the middle of reaching agreement on an individual state-machine command. Vert...
Leslie Lamport, Dahlia Malkhi, Lidong Zhou
90
Voted
TCC
2009
Springer
114views Cryptology» more  TCC 2009»
16 years 1 months ago
Predicate Privacy in Encryption Systems
Predicate encryption is a new encryption paradigm which gives a master secret key owner fine-grained control over access to encrypted data. The master secret key owner can generat...
Emily Shen, Elaine Shi, Brent Waters
102
Voted
ICDCS
2009
IEEE
15 years 10 months ago
Fault-Tolerant Consensus in Unknown and Anonymous Networks
This paper investigates under which conditions information can be reliably shared and consensus can be solved in unknown and anonymous message-passing networks that suffer from cr...
Carole Delporte-Gallet, Hugues Fauconnier, Andreas...
88
Voted
PEPM
2009
ACM
15 years 9 months ago
Linear logical approximations
ract interpretation of programs relates the exact semantics of a programming language to an approximate semantics that can be effectively computed. We show that, by specifying ope...
Robert J. Simmons, Frank Pfenning
CICLING
2009
Springer
15 years 7 months ago
Semantic-Based Temporal Text-Rule Mining
Abstract. In many contexts today, documents are available in a number of versions. In addition to explicit knowledge that can be queried/searched in documents, these documents also...
Kjetil Nørvåg, Ole Kristian Fivelstad