Filters








22,769 Hits in 4.9 sec

Asynchronous group key exchange with failures

Christian Cachin, Reto Strobl
2004 Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing - PODC '04  
Group key exchange protocols allow a group of servers communicating over an asynchronous network of point-to-point links to establish a common key, such that an adversary which fully controls the network  ...  In this paper, we propose the first purely asynchronous group key exchange protocol that tolerates a minority of servers to crash.  ...  The Ideal System for Group Key Exchange Our ideal system Sys ideal,gke n for group key exchange models how n servers repeatedly establish a session key.  ... 
doi:10.1145/1011767.1011820 dblp:conf/podc/CachinS04 fatcat:y7ao4zhnv5fbfo2psvbejayzja

A computational infrastructure for grid-based asynchronous parallel applications

Zhen Li, Manish Parashar
2007 Proceedings of the 16th international symposium on High performance distributed computing - HPDC '07  
Task with communication dependencies should be mapped to the same coordination group if possible, as communications across groups can be expensive.  ...  The architecture of CometG, shown in Figure 1 , consists of 3 key layers.  ... 
doi:10.1145/1272366.1272404 dblp:conf/hpdc/LiP07 fatcat:qsro7grhcff4fmbtbxymfexu3q

Grid-based asynchronous replica exchange

Zhen Li, Manish Parashar
2007 2007 8th IEEE/ACM International Conference on Grid Computing  
This paper presents an asynchronous formulation of the replica exchange algorithm and the design and implementation of a Grid-based asynchronous replica exchange engine (GARE).  ...  It enables the dynamic and asynchronous interactions required by the algorithm to be simply expressed and efficiently implemented.  ...  Note that due to the asynchronous nature of the algorithm, other walkers are not affected by the failure and restart of a walker except that any attempt to exchange with this walker will not succeed. •  ... 
doi:10.1109/grid.2007.4354134 dblp:conf/grid/LiP07 fatcat:bstb4bmx4jcy5ant4oko4flgfu

A Decentralized Computational Infrastructure for Grid-Based Parallel Asynchronous Iterative Applications

Zhen Li, Manish Parashar
2006 Journal of Grid Computing  
Key words decentralized (peer-to-peer) tuple space .  ...  Desktop Grids . parallel asynchronous iterative algorithms 35 Abbreviations BOT bag of task PDE partial differential equation J Grid Computing (2006) 0:0-0 task communications.  ...  The bootstrap phase is used to setup a coordination group. During this phase, peer nodes join the CometG JXTA peergroup and exchange messages with the rest of the group.  ... 
doi:10.1007/s10723-006-9033-9 fatcat:2njdod4wqnhtva35vz5iofavji

Fault Tolerant Implementation of Peer-to-peer Distributed Iterative Algorithms

The Tung Nguyen, Didier El Baz
2012 2012 IEEE 15th International Conference on Computational Science and Engineering  
An adaptive fault tolerance mechanism ensures the robustness of computation to cope with peer faults.  ...  We consider also fault tolerance from an algorithmic point of view: we concentrate in particular on distributed asynchronous iterative algorithms that can tolerate some message loss.  ...  key.  ... 
doi:10.1109/iccse.2012.103 dblp:conf/cse/NguyenB12 fatcat:njfllr7n35g7lfwfgrczp5ryty

Parasternal electromyography to determine the relationship between patient-ventilator asynchrony and nocturnal gas exchange during home mechanical ventilation set-up

Michelle Ramsay, Swapna Mandal, Eui-Sik Suh, Joerg Steier, Abdel Douiri, Patrick Brian Murphy, Michael Polkey, Anita Simonds, Nicholas Hart
2015 Thorax  
18 albeit a minimal clinically important difference Key messages What is the key question?  ...  Importantly, we have detailed the high prevalence of PVA during initiation of HMV in patients with stable chronic respiratory failure and shown that up to a third of the breaths were asynchronous during  ... 
doi:10.1136/thoraxjnl-2015-206944 pmid:26197816 fatcat:hw7oi4l5e5gljoqcl5tvrvro6u

Towards Understanding How and Why Learners Participate in Online Seminars

Stefan Hrastinski
2010 2010 43rd Hawaii International Conference on System Sciences  
An online class that attended asynchronous and synchronous online seminars was studied.  ...  In the interviews, three key inhibitors to exchanging information were identified.  ...  However, two key inhibitors to socializing were identified.  ... 
doi:10.1109/hicss.2010.409 dblp:conf/hicss/Hrastinski10 fatcat:tvosskb7xrddvcns2dsnmvqe5q

Critical success factors in a TRIDEM exchange

MIRJAM HAUCK
2007 ReCALL  
Beyond considering some of the known factors influencing success and failure in CMC-based collaborations such as discrepancies in target language competence among learners, this article also explores affective  ...  Computer-mediated-communication (CMC) tools allowing learners to be in contact with native speakers of their target language in other locations are becoming increasingly flexible, often combining different  ...  success or failure.  ... 
doi:10.1017/s0958344007000729 fatcat:44ozebio4ffinfbmr5ijklaglu

D2.5 - Final Symbiote Virtual Iot Environment Implementation

Matteo Pardi, Gianluca Insolvibile, Tomasz Rajtar, Mateusz Łukaszenko, Szymon Mueller, Artur Jaworski, Mikołaj Dobski, Vasileios Glykantzis, Tilemachos Pechlivanoglou, Daniele Caldarola, Nemanja Ignjatov, Jose Antonio Sanchez
2017 Zenodo  
Its interface, based on asynchronous exchanges and routing keys, is described in Table 7 .  ...  Its interface, based on asynchronous exchanges and routing keys, is described in Table 10 .  ...  This security features, known as Security Handler in the component diagrams, provide a layer with utilities for local security operations as well as communication with symbiote AAM instances, be it on  ... 
doi:10.5281/zenodo.830233 fatcat:ftwlofalcnakrmvx2xqnjeut7u

Papaya: Practical, Private, and Scalable Federated Learning [article]

Dzmitry Huba, John Nguyen, Kshitiz Malik, Ruiyu Zhu, Mike Rabbat, Ashkan Yousefpour, Carole-Jean Wu, Hongyuan Zhan, Pavel Ustinov, Harish Srinivas, Kaikai Wang, Anthony Shoumikhin (+2 others)
2022 arXiv   pre-print
each device, and millions of clients coordinating with a central server being primary ones.  ...  In this work, we outline a production asynchronous FL system design.  ...  The trusted party runs N (N > n) DH key exchange protocol instances and obtains N DH key exchange initial messages.  ... 
arXiv:2111.04877v2 fatcat:gta3y4qoxbfhlopfzk7263neke

Negotiating mutually satisfying IS action research topics with organizations: an analysis of Rapoport's initiative dilemma

Ned Kock
1997 Journal of Workplace Learning  
Discusses failure types that may result from this negotiation process and how to avoid them.  ...  The emphasis that the model places on information exchange suggests that failure in IS action research projects is closely related to how this information exchange takes place.  ...  Seven copies of this project were distributed to key managers at Govern together with a reply form with questions designed to get their feedback on the report and assess support to the project.  ... 
doi:10.1108/13665629710190059 fatcat:q6sncyxki5by7naejatey25uey

Implementing Trustworthy Services Using Replicated State Machines

F.B. Schneider, Lidong Zhou
2005 IEEE Security and Privacy  
One could argue that attacks can be seen as just another cause for component failure.  ...  For some years, we have been investigating how to construct systems that continue functioning despite component failures and attacks.  ...  It stores private keys using secret sharing Exchange with proactive refresh, uses threshold cryptography, and employs a distributed blinding protocol to send confidential (CODEX) 33 information from  ... 
doi:10.1109/msp.2005.125 fatcat:e3mnqp4aqrbrxloyxfhi4nz4ci

Implementing Trustworthy Services Using Replicated State Machines [chapter]

Fred B. Schneider, Lidong Zhou
2005 Lecture Notes in Computer Science  
One could argue that attacks can be seen as just another cause for component failure.  ...  For some years, we have been investigating how to construct systems that continue functioning despite component failures and attacks.  ...  It stores private keys using secret sharing Exchange with proactive refresh, uses threshold cryptography, and employs a distributed blinding protocol to send confidential (CODEX) 33 information from  ... 
doi:10.1007/978-3-642-11294-2_8 fatcat:pjsapx7n4fgv5ms7v2fhvg4yjq

A new dependable exchange protocol

Hao Wang, Heqing Guo, Manshan Lin, Jianfei Yin, Qi He, Jun Zhang
2006 Computer Communications  
With proper convertible signature scheme and message logging method, the exchange protocol provides a recovery method for network and local system failures.  ...  Many recent fair-exchange protocols can recover the transaction from network failures; however, few can survive local system failures. In this paper, we propose a new Dependable Exchange Protocol.  ...  Assume G is a multiplicative group of prime order p. Key generation algorithm of the GDH signature scheme picks a GDH group of order p, and random g 2 G, x 2 Z p .  ... 
doi:10.1016/j.comcom.2005.10.028 fatcat:22naxfittneozi3zt3gfv6ntle

Building reliable distributed systems with CORBA

Sean Landis, Silvano Maffeis
1997 Theory and Practice of Object Systems  
New classes of large-scale distributed applications will have to deal with unpredictable communication delays, with partial failures, and with networks that partition.  ...  In this paper we present extensions to CORBA which provide group communication, reliability, and fault-tolerance.  ...  key, i n a n y e n try) raises(ENTRY EXISTS) // Retrieve an entry by key. void lookup(in string key, o u t a n y e n try) raises(NO SUCH ENTRY) // Remove the entry with key. void remove(in string key,  ... 
doi:10.1002/(sici)1096-9942(1997)3:1<31::aid-tapo4>3.0.co;2-a fatcat:vk3ekyv455hftc4zrc4sedk4rq
« Previous Showing results 1 — 15 out of 22,769 results