Filters








727,684 Hits in 4.4 sec

DiVinE – A Tool for Distributed Verification [chapter]

Jiří Barnat, Luboš Brim, Ivana Černá, Pavel Moravec, Petr Ročkai, Pavel Šimeček
2006 Lecture Notes in Computer Science  
We present a tool for cluster-based LTL model-checking and reachability analysis. The tool incorporates several novel distributedmemory algorithms and provides a unique interface to use them.  ...  We describe the basic structure of the tool, discuss the main architecture decisions made, and briefly explain how the tool can be used.  ...  These are, namely, algorithm for cycle detection using additional dependency data structure, algorithm based on negative cycles, algorithms for forward and backward elimination of trivial and non-accepting  ... 
doi:10.1007/11817963_26 fatcat:72fm4hlidbeqdnt2t2s45a4oly

Distributed Verification of Structural Controllability for Linear Time-Invariant Systems [article]

Joao Carvalho, Sergio Pequito, A. Pedro Aguiar, Soummya Kar, Karl H. Johansson
2015 arXiv   pre-print
Secondly, we provide a distributed algorithm to verify structural controllability for interconnected dynamical systems.  ...  The proposed distributed algorithm is efficient and implementable at the subsystem level; the algorithm is iterative, based on communication among (physically) interconnected subsystems, and requires only  ...  Briefly, the algorithm verifies both conditions (4i) and (4ii) of Theorem 1 in a distributed manner: on one hand, the condition (4i) of Theorem 1 can be verified by applying Algorithm 2.  ... 
arXiv:1506.05770v1 fatcat:4w7weg622vfv3lr5nrgh5sjkxy

Distributed Timestamp Mechanism Based on Verifiable Delay Functions

Qiang Wu, Zhaoyang Han, Ghulam Mohiuddin, Yongjun Ren
2023 Computer systems science and engineering  
Therefore, this paper designs a distributed timestamp mechanism based on continuous verifiable delay functions.  ...  It utilizes multiple independent timestamp servers to provide timestamp services in a distributed model and appends the timestamp to the data once the data is generated.  ...  ; VDF.verify(x, s, p)→{accept, reject} is a fast cryptographic algorithm, in which the algorithm inputs x, p and strengths, and verifies in up to s•v time steps.  ... 
doi:10.32604/csse.2023.030646 fatcat:hgl47wktgzhw5oyaffilxzcm2e

Algorithms for Identifying Rigid Subsystems in Geometric Constraint Systems

Christophe Jermann, Bertrand Neveu, Gilles Trombettoni
2003 International Joint Conference on Artificial Intelligence  
We show that this algorithm is correct in 2D and 3D, and can be used to tackle the major issues related to rigidity: deciding whether a GCSP is rigid or not and identifying rigid (or over-rigid) subGCSPs  ...  In this paper, we question the flow-based algorithm used by Hoffmann et ai to identify rigid subGC-SPs. We show that this algorithm may fail because of the structural rigidity, but also by design.  ...  S" verifies DOF(S")<A" or S" is empty. The two differences between our version of the Distribute function and Hoffmann et a/.'  ... 
dblp:conf/ijcai/JermannNT03 fatcat:tmfgmae7zbfkro7posrr5g3yvu

Robust Burst Detection Algorithm for Distributed Unique Word TDMA Signal

Kunheng Zou, Peng Sun, Jicai Deng, Kexian Gong, Zilong Liu
2021 Electronics  
Simulation and experimental results demonstrate that when the distribution structure of DUW changes, detection probability of the proposed algorithm fluctuates little, and its variance is 1.56×10−5, which  ...  For this, we propose a robust burst detection algorithm based on DUW. Firstly, we allocated the sliding detection windows with the same structures as DUW in order to effectively detect it.  ...  Acknowledgments: We sincerely thank the members of the Communication Signal Analysis and Countermeasure Laboratory of the School of Information Engineering of Zhengzhou University.  ... 
doi:10.3390/electronics11010089 fatcat:dkxee63q3zaqznntt2ybhi4qzy

On-the-fly calculation and verification of consistent steering transactions

David W. Miller, Jinhua Guo, Eileen Kraemer, Yin Xiong
2001 Proceedings of the 2001 ACM/IEEE conference on Supercomputing (CDROM) - Supercomputing '01  
In this paper, we present an algorithm for verifying the consistency of steering transactions.  ...  Interactive Steering can be a valuable tool for understanding and controlling a distributed computation in real-time.  ...  of the primary data structures at the beginning of the algorithm for a hypothetical execution of a distributed computation.  ... 
doi:10.1145/582034.582044 dblp:conf/sc/MillerGKX01 fatcat:ezdhr6yjgna3viegyg3asqnowa

Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures

Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li, Guowen Li
2008 Journal of Communications  
Publicly verifiable secret sharing (PVSS) allows not only shareholders themselves but also everyone verify the shares of a secret distributed by a dealer. It has a lot of electronic applications.  ...  Index Terms-verifiable secret sharing, publicly verifiable secret sharing, verifiable secret redistribution, verifiable encryption I.  ...  ., n P P , and a monotone access structure {1,..., } 2 n Γ ⊆ . There are two algorithms in SS scheme. One is algorithm Share.  ... 
doi:10.4304/jcm.3.7.36-43 fatcat:q4d74cylsbaw5k2mno5no2cu5a

Certification and Authentication of Data Structures

Roberto Tamassia, Nikos Triandopoulos
2010 Alberto Mendelzon Workshop on Foundations of Data Management  
We introduce a new authentication framework that, by design and through the new concept of query certification, aims at verifying the validity of the answer, rather than each step of the algorithm that  ...  We study the design of secure protocols for efficiently verifying the results of queries on data structures that are outsourced to untrusted servers, where answers are processed over relational databases  ...  Verifying the output of algorithms has been the subject of research in the context of correctness checking, including work on the certification of programs, data structures, and graph and geometric algorithms  ... 
dblp:conf/amw/TamassiaT10 fatcat:ooqds6ojurhkzcvjifvgrzfo4a

Topology Verification of Low Voltage Distribution Network Based on k-means Clustering Algorithm

Junyi Wang, Xingquan Ji, Kejun Li, Qiaoyu Sun
2019 IOP Conference Series: Materials Science and Engineering  
The feasibility and effectiveness of the improved k-means clustering algorithm in topology verification are verified by a practical example.  ...  Then k-means clustering algorithm is used by the similarity to cluster the voltage curves to identify and verify the users connected on the incorrectly transformer stations.  ...  Efforts have been made to verify the topology structure. Many researchers have developed various algorithms to update the GIS record when the asset connection changed.  ... 
doi:10.1088/1757-899x/569/5/052096 fatcat:xvt263rndzhbnmnrgmchom76fy

An identification system based on the explicit isomorphism problem [article]

Sándor Z. Kiss, Péter Kutas
2021 arXiv   pre-print
We propose a new identification system based on algorithmic problems related to computing isomorphisms between central simple algebras.  ...  We design a statistical zero knowledge protocol which relies on the hardness of computing isomorphisms between orders in division algebras which generalizes a protocol by Hartung and Schnorr, which relies  ...  We would like to thank the anonymous reviewers for the careful reading and the helpful suggestions which have improved the quality of this paper considerably.  ... 
arXiv:1812.09130v3 fatcat:m7we5nsxtzbjzfdzua26xfm5pm

Dynamic and Verifiable Hierarchical Secret Sharing [chapter]

Giulia Traverso, Denise Demirel, Johannes Buchmann
2016 Lecture Notes in Computer Science  
Furthermore, each shareholder can verify its share received during these algorithms protecting itself against malicious dealers and shareholders.  ...  Since the scheme is dynamic it allows, without reconstructing the message distributed, to add and remove shareholders, to renew shares, and to modify the conditions for accessing the message.  ...  In addition, all these algorithms come with verifiability.  ... 
doi:10.1007/978-3-319-49175-2_2 fatcat:ujttqlagcjbglaqbuaucicgdua

Research on FPGA Based Evolvable Hardware Chips for Solving Super-High Dimensional Equations Group [chapter]

Kangshun Li, Zhaolu Guo, Zhangxin Chen, Baoshan Ge
2010 Lecture Notes in Computer Science  
Solving a super-high dimensional equations group is widely used in science and engineering, but the slow solution speed is the biggest problem researchers face.  ...  The core architecture of SHDESC is a systolic array which consists of thousands of special arithmetic units and can execute many super-high dimensional matrix operations parallelly in short time as well  ...  distribution, time sequence simulation and verifying, circuit board level simulation and verify, and programming of Soc (System of chip) and verifying [8] [9]. 2.1.  ... 
doi:10.1007/978-3-642-11842-5_7 fatcat:qbhr6wtdrfcpjgdfxuo33s4abi

Clock Synchronization Algorithm for Structural Modal Measurement

Junliang Hu, Kai Li, Chaoxian Yan, Huawei Guo, Nannan Cui, Shiping Huang, Xiaoyan Ding
2022 Advances in Civil Engineering  
The synchronization of multiple sensors and onsite structural modal testing verifies the correctness of the process after synchronization.  ...  This paper uses an improved TSPN algorithm for clock synchronization. It is assumed that the delay of the data in the transmission process obeys normal distribution.  ...  Acknowledgments is paper was supported by the Natural Science Foundation of China (NSFC) (Grant nos. 11672108 and 11202080) and Advances in Civil Engineering Science and Technology Project of Shandong  ... 
doi:10.1155/2022/7864160 doaj:1ad00dc743ab45f59c2017e7c67bce62 fatcat:pykwykpjibblblb6gt2bib3kx4

Multi-frame Image Processing Based on Wireless Sensor Networks

Xianfeng Yang, Xiaojian Jia
2018 International Journal of Online Engineering (iJOE)  
Through comparative analysis, the feasibility of distributed image compression algorithm based on SHIHT presented in this study is verified.</span>  ...  image processing algorithms based on wavelet transform using literature analysis, simulation experiment, data analysis and other research methods, proposes a distributed image compression algorithm based  ...  relationship between network life cycle and node density, which verifies the feasibility of the proposed SHIHT-based distributed image compression algorithm.  ... 
doi:10.3991/ijoe.v14i10.9306 fatcat:wqomclaajvh27lc37fepovib2i

Authenticating distributed data using Web services and XML signatures

Daniel J. Polivy, Roberto Tamassia
2002 Proceedings of the 2002 ACM workshop on XML security - XMLSEC '02  
As the need for digital data becomes more ubiquitous, so does the need to provide efficient mechanisms for distributing and verifying the authenticity of that data.  ...  We present an architecture for authenticating responses to queries from untrusted mirrors of authenticated dictionaries using Web Services and XML Signatures.  ...  ACKNOWLEDGMENTS The authors would like to acknowledge the assistance and support of all the STMS team members and especially Michael Goodrich, Robert Cohen, David Emory and Michael Shin.  ... 
doi:10.1145/764792.764805 dblp:conf/xmlsec/PolivyT02 fatcat:3nvkhy4lofckjdnrjgizclmxly
« Previous Showing results 1 — 15 out of 727,684 results