Conference paper
Identity delegation in policy based systems
Rajeev Gupta, Shourya Roy, et al.
ICAC 2006
The notion of a weak snapshot scan is introduced and a methodology for using this abstraction is proposed. Two examples of algorithms are presented whose performance is enhanced while retaining a simple modular structure: bounded concurrent time-stamping and bounded randomized consensus. The resulting time-stamping protocol dominates all other currently known time-stamping protocols.
Rajeev Gupta, Shourya Roy, et al.
ICAC 2006
Maciel Zortea, Miguel Paredes, et al.
IGARSS 2021
Lixi Zhou, Jiaqing Chen, et al.
VLDB
Michael C. McCord, Violetta Cavalli-Sforza
ACL 2007