咨询与建议

限定检索结果

文献类型

  • 57 篇 期刊文献
  • 32 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 90 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 84 篇 工学
    • 60 篇 计算机科学与技术...
    • 34 篇 电气工程
    • 31 篇 信息与通信工程
    • 14 篇 软件工程
    • 12 篇 控制科学与工程
    • 7 篇 电子科学与技术(可...
    • 2 篇 交通运输工程
    • 1 篇 机械工程
    • 1 篇 动力工程及工程热...
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 安全科学与工程
  • 9 篇 理学
    • 8 篇 数学
    • 1 篇 物理学
    • 1 篇 系统科学
  • 8 篇 管理学
    • 8 篇 管理科学与工程(可...
  • 1 篇 哲学

主题

  • 90 篇 distributed prot...
  • 8 篇 wireless sensor ...
  • 5 篇 multi-agent syst...
  • 4 篇 security
  • 4 篇 protocols
  • 3 篇 fault tolerance
  • 3 篇 ad hoc networks
  • 3 篇 optimization
  • 3 篇 wireless network...
  • 2 篇 internet of thin...
  • 2 篇 scalability
  • 2 篇 routing
  • 2 篇 clustering
  • 2 篇 approximation al...
  • 2 篇 switching networ...
  • 2 篇 scaled group con...
  • 2 篇 power gain
  • 2 篇 consensus
  • 2 篇 quality of servi...
  • 2 篇 multiagent syste...

机构

  • 4 篇 beihang univ bua...
  • 2 篇 beihang univ bua...
  • 2 篇 univ calif los a...
  • 2 篇 kyoto univ dept ...
  • 2 篇 intelligent auto...
  • 2 篇 beihang univ bua...
  • 2 篇 univ calif los a...
  • 2 篇 univ illinois de...
  • 1 篇 univ patras dept...
  • 1 篇 beihang univ key...
  • 1 篇 res & dev ctr cr...
  • 1 篇 rice univ dept e...
  • 1 篇 curtin univ sch ...
  • 1 篇 univ calif river...
  • 1 篇 univ michigan an...
  • 1 篇 univ elect sci &...
  • 1 篇 technion israel ...
  • 1 篇 beihang univ dep...
  • 1 篇 univ elect sci &...
  • 1 篇 arizona state un...

作者

  • 6 篇 jia yingmin
  • 4 篇 zhang bin
  • 3 篇 du junping
  • 2 篇 gupta indranil
  • 2 篇 costa pedro akos
  • 2 篇 matsuno fumitosh...
  • 2 篇 xu jie
  • 2 篇 leitao joao
  • 2 篇 yu junyan
  • 2 篇 rom r
  • 2 篇 singh g
  • 2 篇 nikoletseas soti...
  • 2 篇 zhang jun
  • 2 篇 meng deyuan
  • 2 篇 van der schaar m...
  • 2 篇 shi yi
  • 2 篇 sagduyu yalin e.
  • 1 篇 kalyanasundaram ...
  • 1 篇 autkar shriya v.
  • 1 篇 tao runzhou

语言

  • 88 篇 英文
  • 2 篇 其他
检索条件"主题词=Distributed protocols"
90 条 记 录,以下是1-10 订阅
排序:
SAT-Based Quantified Symmetric Minimization of the Reachable States of distributed protocols: An Update  12th
SAT-Based Quantified Symmetric Minimization of the Reachable...
收藏 引用
12th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation
作者: Luo, Yun-Rong Goel, Aman Sakallah, Karem Univ Michigan Ann Arbor MI 48109 USA Amazon Web Serv Seattle WA USA
In prior work [13], we introduced a procedure for deriving minimum formulas in first-order logic (FOL) for the reachable states of a restricted class of multi-sorted distributed protocol specifications: protocols with... 详细信息
来源: 评论
distributed protocols for networks with mobile users - The Mobilizer approach
收藏 引用
WIRELESS NETWORKS 2001年 第1期7卷 21-31页
作者: Mizrachi, B Sidi, M Cidon, I Technion Israel Inst Technol Dept Elect Engn IL-32000 Haifa Israel
This paper introduces a novel approach, called Mobilizer, of operating synchronous communication protocols in cellular mobile environment. First, we present a distributed protocol, called Mobile Propagation of Informa... 详细信息
来源: 评论
distributed protocols for Interference Management in Cooperative Networks
收藏 引用
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 2012年 第9期30卷 1633-1640页
作者: Hunter, Christopher Sabharwal, Ashutosh Rice Univ Dept Elect & Comp Engn Houston TX 77005 USA
In scenarios where devices are too small to support MIMO antenna arrays, symbol-level cooperation may be used to pool the resources of distributed single-antenna devices to create a virtual MIMO antenna array. We addr... 详细信息
来源: 评论
distributed protocols at the Rescue for Trustworthy Online Voting  3
Distributed Protocols at the Rescue for Trustworthy Online V...
收藏 引用
3rd International Conference on Information Systems Security and Privacy (ICISSP) / International Conference on Security and Cryptography (SECRYPT)
作者: Riemann, Robert Grumbach, Stephane Inria Grenoble Rhone Alpes Lyon France
While online services emerge in all areas of life, the voting procedure in many democracies remains paper-based as the security of current online voting technology is highly disputed. We address the issue of trustwort... 详细信息
来源: 评论
distributed protocols for Oblivious Transfer and Polynomial Evaluation  24th
Distributed Protocols for Oblivious Transfer and Polynomial ...
收藏 引用
24th International Conference on Cryptology in India (INDOCRYPT)
作者: Ben Arie, Aviad Tassa, Tamir Open Univ Israel Raanana Israel
A secure multiparty computation (MPC) allows several parties to compute a function over their inputs while keeping their inputs private. In its basic setting, the protocol involves only parties that hold inputs. In di... 详细信息
来源: 评论
The design of novel distributed protocols from differential equations
收藏 引用
distributed COMPUTING 2007年 第2期20卷 95-114页
作者: Gupta, Indranil Nagda, Mahvesh Devaraj, Christo Frank Univ Illinois Dept Comp Sci Urbana IL 61801 USA Wolverine Asset Management Naperville IL 60564 USA Microsoft Corp Seattle WA 98121 USA
This paper proposes a framework to translate certain subclasses of differential equation systems into practical protocols for distributed systems. The generated protocols are intended for large-scale distributed syste... 详细信息
来源: 评论
ON THE RELATIVE EXECUTION TIMES OF distributed protocols
收藏 引用
INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING 1991年 第3期20卷 203-235页
作者: SINGH, G BERNSTEIN, AJ KANSAS STATE UNIV AGR & APPL SCI DEPT COMP & INFORMAT SCIMANHATTANKS 66506 SUNY STONY BROOK DEPT COMP SCISTONY BROOKNY 11794
We provide a formalism for comparing the average execution time of distributed protocols in a manner independent of the properties of the network on which the protocols are executed. The formalism takes into account c... 详细信息
来源: 评论
Mostly Automated Verification of Liveness Properties for distributed protocols with Ranking Functions
收藏 引用
PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL 2024年 第POPL期8卷 1028-1059页
作者: Yao, Jianan Tao, Runzhou Gu, Ronghui Nieh, Jason Columbia Univ New York NY 10027 USA
distributed protocols have long been formulated in terms of their safety and liveness properties. Much recent work has focused on automatically verifying the safety properties of distributed protocols, but doing so fo... 详细信息
来源: 评论
Babel: A Framework for Developing Performant and Dependable distributed protocols  41
Babel: A Framework for Developing Performant and Dependable ...
收藏 引用
41st International Symposium on Reliable distributed Systems (SRDS)
作者: Fouto, Pedro Costa, Pedro Akos Preguica, Nuno Leitao, Joao NOVA LINCS Lisbon Portugal NOVA FCT Lisbon Portugal
Prototyping and implementing distributed algorithms, particularly those that address challenges related with fault-tolerance and dependability, is a time consuming task. This is, in part, due to the need of addressing... 详细信息
来源: 评论
Automated Attacker Synthesis for distributed protocols  39th
Automated Attacker Synthesis for Distributed Protocols
收藏 引用
39th International Conference on Computer Safety, Reliability and Security (SAFECOMP)
作者: von Hippel, Max Tripakis, Cole Vick Stavros Nita-Rotaru, Cristina Northeastern Univ Boston MA 02118 USA
distributed protocols should be robust to both benign malfunction (e.g. packet loss or delay) and attacks (e.g. message replay). In this paper we take a formal approach to the automated synthesis of attackers, i.e. ad... 详细信息
来源: 评论