Sciweavers

478 search results - page 46 / 96
» A new approach to auctions and resilient mechanism design
Sort
View
CRYPTO
1989
Springer
163views Cryptology» more  CRYPTO 1989»
14 years 1 months ago
Undeniable Signatures
Abstract. In this paper, we provide a new approach to study undeniable signatures by translating secure digital signatures to secure undeniable signatures so that the existing algo...
David Chaum, Hans Van Antwerpen
IWSOC
2003
IEEE
104views Hardware» more  IWSOC 2003»
14 years 2 months ago
Incorporating Pattern Prediction Technique for Energy Efficient Filter Cache Design
: - A filter cache is proposed at a higher level than the L1 (main) cache in the memory hierarchy and is much smaller. The typical size of filter cache is of the order of 512 Bytes...
Kugan Vivekanandarajah, Thambipillai Srikanthan, S...
CCR
2008
91views more  CCR 2008»
13 years 9 months ago
Serial experiments online
Current network protocols must comply with rigid interfaces and rules of behavior to fit into well defined, vertical protocol stacks. It is difficult for network designers to offe...
Juan J. Ramos-Muñoz, Lidia Yamamoto, Christ...
IFIP
2007
Springer
14 years 3 months ago
Multicast in UMTS: Adopting TCP-Friendliness
In this paper, we present a novel mechanism for the multicast congestion control over UMTS networks. The proposed mechanism is based on the well known TCP-Friendly Multicast Conges...
Antonios G. Alexiou, Christos Bouras, Andreas Papa...
ESA
2006
Springer
92views Algorithms» more  ESA 2006»
14 years 20 days ago
Out-of-Order Event Processing in Kinetic Data Structures
We study the problem of designing kinetic data structures (KDS's for short) when event times cannot be computed exactly and events may be processed in a wrong order. In tradi...
Mohammad Ali Abam, Pankaj K. Agarwal, Mark de Berg...