نتایج جستجو برای: safe
تعداد نتایج: 125597 فیلتر نتایج به سال:
We investigate the computational aspects of safe manipulation, a new model of coalitional manipulation that was recently put forward by Slinko and White [11]. In this model, a potential manipulator v announces how he intends to vote, and some of the other voters whose preferences coincide with those of v may follow suit. Depending on the number of followers, the outcome could be better or worse...
In this brief note we connect the discrete logarithm problem over prime fields in the safe prime case to the logarithmic derivative.
We propose a new protocol that can be used to implement a partitionable membership service majority-partition and partitionable membership services for timed asynchronous systems. The protocol is fail-aware in the sense that a process knows at all times if its approximation of the set of processes in its partition is up-to-date or out-of-date. The protocol minimizes wrong suspicions of processe...
Fail-slow hardware is an under-studied failure mode. We present a study of 101 reports of fail-slow hardware incidents, collected from large-scale cluster deployments in 12 institutions. We show that all hardware types such as disk, SSD, CPU, memory and network components can exhibit performance faults. We made several important observations such as faults convert from one form to another, the ...
Infant transport has been carried out in Slovenia since 1976. Applying the principles of safe transport was essential to avoid unexpected exposure of critically ill infants to unnecessary and adverse events. Besides organizational and technical prerequisites for safe transportation, evidence-based clinical knowledge and practical competence are of utmost importance. Furthermore, the ongoing pos...
Web content is migrating away from simple hyperlinked documents towards a diverse set of programs that execute within the web browser. Unfortunately, modern browsers do not provide a safe environment for running these web programs. In this paper, we show how current web security threats are symptoms of four key problems in supporting web programs: vague program boundaries, unwanted code, poor i...
The rapid growth of wireless technology has led to increasing demand for spectrum. In the past, spectrum is statically allocated. As a result, many wireless applications cannot use idle spectrum even though it is left unused by the owner for a long period of time. The low utilization of already scarce spectrum resource requires us to dynamically reallocate the idle spectrum to achieve better sp...
In this paper we examine the development of modular self-reconfigurable robots. A survey of existing modular robots is given. Some limitations of homogeneous designs and connection mechanisms are discussed. Therefore, we propose a heterogeneous self-reconfigurable robot with genderless, fail-safe connecting mechanisms. We initially design three basic types (joint, power and special units) of mo...
ÐWe study similarity queries for time series data where similarity is defined, in a fairly general way, in terms of a distance function and a set of affine transformations on the Fourier series representation of a sequence. We identify a safe set of transformations supporting a wide variety of comparisons and show that this set is rich enough to formulate operations such as moving average and t...
Public-Key-Infrastrukturen sind von zentraler Bedeutung für eine sichere elektronische Kommunikation in offenen Netzen. Unternehmen, Behörden und Privatleute nutzen diese Technik in zunehmendem Maße und verlassen sich auf sie. Public-Key-Infrastrukturen bergen aber auch Risiken, weil die der PublicKey-Kryptographie zugrunde liegenden mathematischen Probleme nicht beweisbar sicher sind, und weil...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید