Sciweavers

18090 search results - page 19 / 3618
» Computing by Only Observing
Sort
View
ACNS
2004
Springer
167views Cryptology» more  ACNS 2004»
14 years 6 days ago
A Fully-Functional Group Signature Scheme over Only Known-Order Group
The concept of group signature allows a group member to sign message anonymously on behalf of the group. In the event of a dispute, a designated entity can reveal the identity of a...
Atsuko Miyaji, Kozue Umeda
FCCM
2004
IEEE
141views VLSI» more  FCCM 2004»
14 years 6 days ago
Deep Packet Filter with Dedicated Logic and Read Only Memories
Searching for multiple string patterns in a stream of data is a computationally expensive task. The speed of the search pattern module determines the overall performance of deep p...
Young H. Cho, William H. Mangione-Smith
DNIS
2007
Springer
114views Database» more  DNIS 2007»
14 years 2 months ago
Improving the Performance of Read-Only Transactions Through Speculation
A read-only transaction (ROT) does not modify any data. The main issues regarding processing ROTs are correctness, data currency and performance. Two-phase Locking (2PL) protocol i...
Thirumalaisamy Ragunathan, P. Krishna Reddy
MWCN
2004
Springer
14 years 1 months ago
Collaboration Enforcement and Adaptive Data Redirection in Mobile Ad Hoc Networks Using Only First-Hand Experience
: In Mobile Ad Hoc Networks (MANETs), all participating hosts are obligated to route and forward data for others to guarantee the availability of network applications and services....
Ning Jiang, Kien A. Hua, Mounir A. Tantaoui
ASPLOS
1996
ACM
14 years 18 days ago
Shasta: A Low Overhead, Software-Only Approach for Supporting Fine-Grain Shared Memory
This paper describes Shasta, a system that supports a shared address space in software on clusters of computers with physically distributed memory. A unique aspect of Shasta compa...
Daniel J. Scales, Kourosh Gharachorloo, Chandramoh...