نتایج جستجو برای: early abort technique

تعداد نتایج: 1270850  

2014
Hing Choi Wong

In real-time systems, a schedulable task-set guarantees that all tasks complete before their deadlines. In functional programming, atomic execution provides the correctness of the program. Priority-based functional reactive programming (P-FRP) allows the usage of functional programming in the real-time system environment. The abort-and-restart (AR) is a scheme to implement P-FRP but an appropri...

1999
H. Hahn A. Dunbar C. I. Pai R. T. Sanders N. Tsoupas J. E. Tuozzolo

The energy stored in the RHIC beam is about 200 kJ per ring at design energy and intensity. To prevent quenching of the superconducting magnets or material damage, the beam will be safely disposed of by an internal beam abort system, which includes the kicker magnets, the pulsed power supplies, and the dump absorber. Disposal of heavy ions, such as gold, imposes design constraints more severe t...

2017
Alexandre Gélin Benjamin Wesolowski

Cryptographic schemes based on supersingular isogenies have become an active area of research in the field of post-quantum cryptography. We investigate the resistance of these cryptosystems to fault injection attacks. It appears that the iterative structure of the secret isogeny computation renders these schemes vulnerable to loop-abort attacks. Loop-abort faults allow to perform a full key rec...

2014
Yuval Ishai Rafail Ostrovsky Vassilis Zikas

Protocols for secure multi-party computation (MPC) that resist a dishonest majority are susceptible to “denial of service” attacks, allowing even a single malicious party to force the protocol to abort. In this work, we initiate a systematic study of the more robust notion of security with identifiable abort, which leverages the effect of an abort by forcing, upon abort, at least one malicious ...

Journal: :International Journal on Software Tools for Technology Transfer 2011

Journal: :Lecture Notes in Computer Science 2021

This paper closes the question of possibility two-round MPC protocols achieving different security guarantees with and without availability broadcast in any given round. Cohen et al. [CGZ20] study this dishonest majority setting; we complete picture by studying honest setting. In setting, both rounds, it is known that strongest guarantee—guaranteed output delivery—is achievable [GLS15]. We show...

Journal: :IEEE Trans. Knowl. Data Eng. 2002
Gopi K. Attaluri Kenneth Salem

This paper describes the presumed-either two-phase commit protocol. Presumed-either exploits log piggybacking to reduce the cost of committing transactions. If timely piggybacking occurs, presumed-either combines the performance advantages of presumed-abort and presumed-commit. Otherwise, presumed-either behaves much like the widely-used presumed-abort protocol.

Journal: :PVLDB 2017
Jose M. Faleiro Daniel J. Abadi Joseph M. Hellerstein

In order to guarantee recoverable transaction execution, database systems permit a transaction’s writes to be observable only at the end of its execution. As a consequence, there is generally a delay between the time a transaction performs a write and the time later transactions are permitted to read it. This delayed write visibility can significantly impact the performance of serializable data...

Journal: :Remote Sensing 2023

Through formation flying, the distributed spaceborne SAR(synthetic aperture radar) system can increase number of spatial degree freedoms (DOFs) and provide flexible multi-baselines for SAR-GMTI (ground moving target indication), which improves performance. This paper proposes an a priori knowledge-based adaptive clutter cancellation detection technique applied to systems. Firstly, is exploited ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید