Sciweavers

4305 search results - page 244 / 861
» Analysing Protocol Implementations
Sort
View
EUROPAR
2004
Springer
14 years 3 months ago
Agreement-Based Interactions for Experimental Science
Enabling quality of service (QoS) in the Grids requires not only resource management strategies but also the development of protocols enabling structured negotiation for the use of...
Katarzyna Keahey, Takuya Araki, Peter Lane
CRYPTO
2006
Springer
99views Cryptology» more  CRYPTO 2006»
14 years 1 months ago
Scalable Secure Multiparty Computation
We present the first general protocol for secure multiparty computation which is scalable, in the sense that the amortized work per player does not grow, and in some natural settin...
Ivan Damgård, Yuval Ishai
CANS
2005
Springer
105views Cryptology» more  CANS 2005»
14 years 3 months ago
A Novel Method to Maintain Privacy in Mobile Agent Applications
Abstract. Two methods to implement privacy in network communication, anonymity and DCSC (data confidentiality and secure computation) are analysed and compared in regard to privac...
Kun Peng, Ed Dawson, Juanma González Nieto,...
ICRA
1994
IEEE
118views Robotics» more  ICRA 1994»
14 years 1 months ago
Developing Parallel Architectures for Range and Image Sensors
We describe a cost-effective method for developing parallel architectures which increase the performance of range and image sensors. A parametrised edge detector and its systolic ...
Shaori Guo, Wayne Luk, Penelope Probert
CADUI
2004
13 years 11 months ago
MAUI: An Interface Design Tool Based on Matrix Algebra
Abstract We describe MAUI, a user interface design tool that is based on a matrix algebra model of interaction. MAUI can be used to build and analyse designs for interactive system...
Jeremy Gow, Harold W. Thimbleby