Sciweavers

247 search results - page 14 / 50
» A Self-healing Key Distribution Scheme with Novel Properties
Sort
View
HPCA
2008
IEEE
14 years 9 months ago
Address-branch correlation: A novel locality for long-latency hard-to-predict branches
Hard-to-predict branches depending on longlatency cache-misses have been recognized as a major performance obstacle for modern microprocessors. With the widening speed gap between...
Hongliang Gao, Yi Ma, Martin Dimitrov, Huiyang Zho...
CDC
2010
IEEE
136views Control Systems» more  CDC 2010»
13 years 3 months ago
A distributed Newton method for Network Utility Maximization
Most existing work uses dual decomposition and subgradient methods to solve Network Utility Maximization (NUM) problems in a distributed manner, which suffer from slow rate of con...
Ermin Wei, Asuman E. Ozdaglar, Ali Jadbabaie
FC
2004
Springer
120views Cryptology» more  FC 2004»
14 years 2 months ago
Identity-Based Chameleon Hash and Applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chamel...
Giuseppe Ateniese, Breno de Medeiros
ICDCSW
2003
IEEE
14 years 2 months ago
SACCS: Scalable Asynchronous Cache Consistency Scheme for Mobile Environments
In this paper, we propose a novel cache consistency maintenance scheme, called Ë Ð Ð ×ÝÒ ÖÓÒÓÙ× ÓÒ× ×Ø Ò Ý Ë Ñ (SACCS), for mobile environments. It relies on ...
Zhijun Wang, Sajal K. Das, Hao Che, Mohan Kumar
FC
2000
Springer
119views Cryptology» more  FC 2000»
14 years 12 days ago
Sharing Decryption in the Context of Voting or Lotteries
Abstract. Several public key cryptosystems with additional homomorphic properties have been proposed so far. They allow to perform computation with encrypted data without the knowl...
Pierre-Alain Fouque, Guillaume Poupard, Jacques St...