نتایج جستجو برای: eternal m secure set
تعداد نتایج: 1205644 فیلتر نتایج به سال:
We consider a discrete-time dynamic problem in graphs in which the goal is to maintain a dominating set over an infinite sequence of time steps. At each time step, a specified vertex in the current dominating set must be replaced by a neighbor. In one version of the problem, the only change to the current dominating set is replacement of the specified vertex. In another version of the problem, ...
The performance of music usually involves a great deal of interpretation by the musician. In classical music, the final ritardando is a good example of the expressive aspect of music performance. Even though expressive timing data is expected to have a strong component that is determined by the piece itself, in this paper we investigate to what degree individual performance style has an effect ...
In secure multiparty computation (SMC), a group of users jointly and securely computes a mathematical function on their private inputs, such that the privacy of their private inputs will be preserved. One of the widely used applications of SMC is the secure multiparty summation which securely computes the summation value of the users’ private inputs. In this paper, we consider a secure multipar...
Dynamics of eternal inflation on the landscape admits description in terms of the Martin-Siggia-Rose (MSR) effective field theory that is in one-to-one correspondence with vacuum dynamics equations. On those sectors of the landscape, where transport properties of the probability measure for eternal inflation are important, renormalization group fixed points of the MSR effective action determine...
Unlike SET (Secure Electronic Transaction) protocol. This paper proposes an ASEP (Advanced Secure Electronic Payment) protocol, which uses ECC (Elliptic Curve Cryptosystem with F2 m not Fp) [1, 2, 3], SHA (Secure Hash Algorithm) and 3BC (Block Byte Bit Cipher) instead of RSA and DES. To improve the strength of encryption and the speed of processing, the public key and the private key of ECC are...
The Eternal system provides transparent fault tolerance for CORBA applications, without requiring the modification of either the application or the ORB. Eternal replicates the application objects, and ensures strong replica consistency by employing reliable totally-ordered multicast messages for conveying the IIOP messages of the application. To maintain replica consistency even as replicas fai...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید