咨询与建议

限定检索结果

文献类型

  • 57 篇 期刊文献
  • 32 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 90 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 84 篇 工学
    • 60 篇 计算机科学与技术...
    • 34 篇 电气工程
    • 31 篇 信息与通信工程
    • 14 篇 软件工程
    • 12 篇 控制科学与工程
    • 7 篇 电子科学与技术(可...
    • 2 篇 交通运输工程
    • 1 篇 机械工程
    • 1 篇 动力工程及工程热...
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 安全科学与工程
  • 9 篇 理学
    • 8 篇 数学
    • 1 篇 物理学
    • 1 篇 系统科学
  • 8 篇 管理学
    • 8 篇 管理科学与工程(可...
  • 1 篇 哲学

主题

  • 90 篇 distributed prot...
  • 8 篇 wireless sensor ...
  • 5 篇 multi-agent syst...
  • 4 篇 security
  • 4 篇 protocols
  • 3 篇 fault tolerance
  • 3 篇 ad hoc networks
  • 3 篇 optimization
  • 3 篇 wireless network...
  • 2 篇 internet of thin...
  • 2 篇 scalability
  • 2 篇 routing
  • 2 篇 clustering
  • 2 篇 approximation al...
  • 2 篇 switching networ...
  • 2 篇 scaled group con...
  • 2 篇 power gain
  • 2 篇 consensus
  • 2 篇 quality of servi...
  • 2 篇 multiagent syste...

机构

  • 4 篇 beihang univ bua...
  • 2 篇 beihang univ bua...
  • 2 篇 univ calif los a...
  • 2 篇 kyoto univ dept ...
  • 2 篇 intelligent auto...
  • 2 篇 beihang univ bua...
  • 2 篇 univ calif los a...
  • 2 篇 univ illinois de...
  • 1 篇 univ patras dept...
  • 1 篇 beihang univ key...
  • 1 篇 res & dev ctr cr...
  • 1 篇 rice univ dept e...
  • 1 篇 curtin univ sch ...
  • 1 篇 univ calif river...
  • 1 篇 univ michigan an...
  • 1 篇 univ elect sci &...
  • 1 篇 technion israel ...
  • 1 篇 beihang univ dep...
  • 1 篇 univ elect sci &...
  • 1 篇 arizona state un...

作者

  • 6 篇 jia yingmin
  • 4 篇 zhang bin
  • 3 篇 du junping
  • 2 篇 gupta indranil
  • 2 篇 costa pedro akos
  • 2 篇 matsuno fumitosh...
  • 2 篇 xu jie
  • 2 篇 leitao joao
  • 2 篇 yu junyan
  • 2 篇 rom r
  • 2 篇 singh g
  • 2 篇 nikoletseas soti...
  • 2 篇 zhang jun
  • 2 篇 meng deyuan
  • 2 篇 van der schaar m...
  • 2 篇 shi yi
  • 2 篇 sagduyu yalin e.
  • 1 篇 kalyanasundaram ...
  • 1 篇 autkar shriya v.
  • 1 篇 tao runzhou

语言

  • 88 篇 英文
  • 2 篇 其他
检索条件"主题词=Distributed Protocols"
90 条 记 录,以下是1-10 订阅
排序:
distributed protocols for Oblivious Transfer and Polynomial Evaluation  24th
Distributed Protocols for Oblivious Transfer and Polynomial ...
收藏 引用
24th International Conference on Cryptology in India (INDOCRYPT)
作者: Ben Arie, Aviad Tassa, Tamir Open Univ Israel Raanana Israel
A secure multiparty computation (MPC) allows several parties to compute a function over their inputs while keeping their inputs private. In its basic setting, the protocol involves only parties that hold inputs. In di... 详细信息
来源: 评论
Mostly Automated Verification of Liveness Properties for distributed protocols with Ranking Functions
收藏 引用
PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL 2024年 第POPL期8卷 1028-1059页
作者: Yao, Jianan Tao, Runzhou Gu, Ronghui Nieh, Jason Columbia Univ New York NY 10027 USA
distributed protocols have long been formulated in terms of their safety and liveness properties. Much recent work has focused on automatically verifying the safety properties of distributed protocols, but doing so fo... 详细信息
来源: 评论
SAT-Based Quantified Symmetric Minimization of the Reachable States of distributed protocols: An Update  12th
SAT-Based Quantified Symmetric Minimization of the Reachable...
收藏 引用
12th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation
作者: Luo, Yun-Rong Goel, Aman Sakallah, Karem Univ Michigan Ann Arbor MI 48109 USA Amazon Web Serv Seattle WA USA
In prior work [13], we introduced a procedure for deriving minimum formulas in first-order logic (FOL) for the reachable states of a restricted class of multi-sorted distributed protocol specifications: protocols with... 详细信息
来源: 评论
Babel: A Framework for Developing Performant and Dependable distributed protocols  41
Babel: A Framework for Developing Performant and Dependable ...
收藏 引用
41st International Symposium on Reliable distributed Systems (SRDS)
作者: Fouto, Pedro Costa, Pedro Akos Preguica, Nuno Leitao, Joao NOVA LINCS Lisbon Portugal NOVA FCT Lisbon Portugal
Prototyping and implementing distributed algorithms, particularly those that address challenges related with fault-tolerance and dependability, is a time consuming task. This is, in part, due to the need of addressing... 详细信息
来源: 评论
Automated Attacker Synthesis for distributed protocols  39th
Automated Attacker Synthesis for Distributed Protocols
收藏 引用
39th International Conference on Computer Safety, Reliability and Security (SAFECOMP)
作者: von Hippel, Max Tripakis, Cole Vick Stavros Nita-Rotaru, Cristina Northeastern Univ Boston MA 02118 USA
distributed protocols should be robust to both benign malfunction (e.g. packet loss or delay) and attacks (e.g. message replay). In this paper we take a formal approach to the automated synthesis of attackers, i.e. ad... 详细信息
来源: 评论
distributed protocols at the Rescue for Trustworthy Online Voting  3
Distributed Protocols at the Rescue for Trustworthy Online V...
收藏 引用
3rd International Conference on Information Systems Security and Privacy (ICISSP) / International Conference on Security and Cryptography (SECRYPT)
作者: Riemann, Robert Grumbach, Stephane Inria Grenoble Rhone Alpes Lyon France
While online services emerge in all areas of life, the voting procedure in many democracies remains paper-based as the security of current online voting technology is highly disputed. We address the issue of trustwort... 详细信息
来源: 评论
Synthesis of distributed protocols from scenarios and specifications
Synthesis of distributed protocols from scenarios and specif...
收藏 引用
作者: Udupa, Abhishek University of Pennsylvania
学位级别:Ph.D.
distributed protocols, typically expressed as stateful agents communicating asynchronously over buffered communication channels, are difficult to design correctly. This difficulty has spurred decades of research in th... 详细信息
来源: 评论
Type-3 Fuzzy Data-Driven Control of Heterogeneous Multi-Agent Systems
收藏 引用
IEEE ACCESS 2025年 13卷 32306-32319页
作者: Liang, Yaqing Tian, Man-Wen Du, Changdong Alattas, Khalid A. Fekih, Afef Mohammadzadeh, Ardashir Nanjing Agr Univ Sch Econ & Management Nanjing 210095 Peoples R China Guangdong Univ Sci & Technol Sch Management Dongguan 523083 Peoples R China Shenyang Univ Technol Sch Artificial Intelligence Shenyang 110870 Peoples R China Univ Jeddah Dept Comp Sci & Artificial Intelligence Jeddah 23218 Saudi Arabia Univ Louisiana Lafayette Dept Elect & Comp Engn Lafayette LA 70504 USA Sakarya Univ Fac Engn Dept Elect & Elect Engn TR-54050 Sakarya Turkiye
This study investigates the data-based consensus problem of discrete-time heterogeneous multi-agent systems (MASs) through the development of distributed protocols. A type-3 (T3) fuzzy logic system (FLS) is presented ... 详细信息
来源: 评论
Fresh-CSMA: A distributed Protocol for Minimizing Age of Information
收藏 引用
JOURNAL OF COMMUNICATIONS AND NETWORKS 2023年 第5期25卷 556-569页
作者: Tripathi, Vishrant Jones, Nicholas Modiano, Eytan MIT Lab Informat & Decis Syst LIDS Cambridge MA 02139 USA
consider the design of distributed scheduling algorithms that minimize age of information (AoI) in single-hop wireless networks. The centralized max-weight policy is known to be nearly optimal in this setting;hence, o... 详细信息
来源: 评论
On Min-Max Storage for Resource-Restricted Clients in Coded Blockchain Systems
收藏 引用
IEEE INTERNET OF THINGS JOURNAL 2023年 第20期10卷 17988-17999页
作者: Yang, Changlin Wang, Xiaodong Jiang, Zigui Liu, Ying Lin, Fengnian Zheng, Zibin Sun Yat Sen Univ Sch Software Engn Zhuhai 519000 Guangdong Peoples R China Columbia Univ Elect Engn Dept New York NY 10027 USA
Blockchain is the foundation of emerging applications, such as smart contracts, nonfungible token (NFT), and metaverse. A key issue is that blockchain requires massive storage space, which limits its deployment in res... 详细信息
来源: 评论