Sciweavers

4305 search results - page 133 / 861
» Analysing Protocol Implementations
Sort
View
IPPS
1999
IEEE
14 years 1 months ago
Lazy Logging and Prefetch-Based Crash Recovery in Software Distributed Shared Memory Systems
In this paper, we propose a new, efficient logging protocol, called lazy logging, and a fast crash recovery protocol, called the prefetch-based crash recovery (PCR), for software ...
Angkul Kongmunvattana, Nian-Feng Tzeng
IOLTS
2007
IEEE
98views Hardware» more  IOLTS 2007»
14 years 3 months ago
Robustness of circuits under delay-induced faults : test of AES with the PAFI tool
Security of cryptographic circuits is a major concern. Fault attacks are a mean to obtain critical information with the use of physical disturbance and cryptanalysis. We propose a...
Olivier Faurax, Assia Tria, Laurent Freund, Fr&eac...
TPDS
2008
199views more  TPDS 2008»
13 years 9 months ago
DCMP: A Distributed Cycle Minimization Protocol for Peer-to-Peer Networks
Abstract-- Broadcast-based Peer-to-Peer (P2P) networks, including flat (e.g., Gnutella) and two-layer super-peer implementations (e.g., Kazaa), are extremely popular nowadays due t...
Zhenzhou Zhu, Panos Kalnis, Spiridon Bakiras
ICDE
2005
IEEE
100views Database» more  ICDE 2005»
14 years 10 months ago
Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants
Standard multi-party computation models assume semi-honest behavior, where the majority of participants implement protocols according to specification, an assumption not always pl...
Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket,...
GLOBECOM
2009
IEEE
14 years 3 months ago
LA-MAC: A Load Adaptive MAC Protocol for MANETs
—The performance of prevalent MAC protocols in MANETs relies on the level of contention in networks. While contention-based MAC protocols such as CSMA suffer from inefficiency u...
Weihong Hu, Xiaolong Li, Homayoun Yousefi'zadeh