نتایج جستجو برای: safe

تعداد نتایج: 125597  

2010
Noam Hazon Edith Elkind

We investigate the computational aspects of safe manipulation, a new model of coalitional manipulation that was recently put forward by Slinko and White [11]. In this model, a potential manipulator v announces how he intends to vote, and some of the other voters whose preferences coincide with those of v may follow suit. Depending on the number of followers, the outcome could be better or worse...

Journal: :IACR Cryptology ePrint Archive 2017
H. Gopalakrishna Gadiyar R. Padma

In this brief note we connect the discrete logarithm problem over prime fields in the safe prime case to the logarithmic derivative.

1996
Christof Fetzer Flaviu Cristian

We propose a new protocol that can be used to implement a partitionable membership service majority-partition and partitionable membership services for timed asynchronous systems. The protocol is fail-aware in the sense that a process knows at all times if its approximation of the set of processes in its partition is up-to-date or out-of-date. The protocol minimizes wrong suspicions of processe...

2018
Haryadi S. Gunawi Riza O. Suminto Russell Sears Casey Golliher Swaminathan Sundararaman Xing Lin Tim Emami Weiguang Sheng Nematollah Bidokhti Caitie McCaffrey Gary Grider Parks M. Fields Kevin Harms Robert B. Ross Andree Jacobson Robert Ricci Kirk Webb Peter Alvaro H. Birali Runesha Mingzhe Hao Huaicheng Li

Fail-slow hardware is an under-studied failure mode. We present a study of 101 reports of fail-slow hardware incidents, collected from large-scale cluster deployments in 12 institutions. We show that all hardware types such as disk, SSD, CPU, memory and network components can exhibit performance faults. We made several important observations such as faults convert from one form to another, the ...

2014
STEFAN GROSEK

Infant transport has been carried out in Slovenia since 1976. Applying the principles of safe transport was essential to avoid unexpected exposure of critically ill infants to unnecessary and adverse events. Besides organizational and technical prerequisites for safe transportation, evidence-based clinical knowledge and practical competence are of utmost importance. Furthermore, the ongoing pos...

2007
Charles Reis Steven D. Gribble Henry M. Levy

Web content is migrating away from simple hyperlinked documents towards a diverse set of programs that execute within the web browser. Unfortunately, modern browsers do not provide a safe environment for running these web programs. In this paper, we show how current web security threats are symptoms of four key problems in supporting web programs: vague program boundaries, unwanted code, poor i...

2013
Ruihao Zhu Fan Wu Guihai Chen

The rapid growth of wireless technology has led to increasing demand for spectrum. In the past, spectrum is statically allocated. As a result, many wireless applications cannot use idle spectrum even though it is left unused by the owner for a long period of time. The low utilization of already scarce spectrum resource requires us to dynamically reallocate the idle spectrum to achieve better sp...

2001
Pakpong Jantapremjit David Austin

In this paper we examine the development of modular self-reconfigurable robots. A survey of existing modular robots is given. Some limitations of homogeneous designs and connection mechanisms are discussed. Therefore, we propose a heterogeneous self-reconfigurable robot with genderless, fail-safe connecting mechanisms. We initially design three basic types (joint, power and special units) of mo...

Journal: :IEEE Trans. Knowl. Data Eng. 2000
Davood Rafiei Alberto O. Mendelzon

ÐWe study similarity queries for time series data where similarity is defined, in a fairly general way, in terms of a distance function and a set of affine transformations on the Fourier series representation of a sequence. We identify a safe set of transformations supporting a wide variety of comparisons and show that this set is rich enough to formulate operations such as moving average and t...

2002
Sönke Maseberg

Public-Key-Infrastrukturen sind von zentraler Bedeutung für eine sichere elektronische Kommunikation in offenen Netzen. Unternehmen, Behörden und Privatleute nutzen diese Technik in zunehmendem Maße und verlassen sich auf sie. Public-Key-Infrastrukturen bergen aber auch Risiken, weil die der PublicKey-Kryptographie zugrunde liegenden mathematischen Probleme nicht beweisbar sicher sind, und weil...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید