Sciweavers

330 search results - page 34 / 66
» Controlling data disclosure in computational PIR protocols
Sort
View
EUROCRYPT
2005
Springer
14 years 2 months ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...
INFOCOM
2003
IEEE
14 years 2 months ago
Time-Optimal Network Queue Control: The Case of a Single Congested Node
-We solve the problem of time-optimal network queue control: what are the input data rates that make network queue sizes converge to their ideal size in the least possible time aft...
Mahadevan Iyer, Wei Kang Tsai
IPPS
2000
IEEE
14 years 1 months ago
Real-Time Transaction Processing Using Two-Stage Validation in Broadcast Disks
Conventional concurrency control protocols are inapplicable in mobile computing environments due to a number of constraints of wireless communications. In this paper, we design a p...
Kwok-Wa Lam, Victor C. S. Lee, Sang Hyuk Son
ISER
1993
Springer
141views Robotics» more  ISER 1993»
14 years 26 days ago
Experimental Integration of Planning in a Distributed Control System
This paper describes a complete system architecture integrating planning into a two-armed robotic workcell. The system is comprised of four major components: user interface, plann...
Gerardo Pardo-Castellote, Tsai-Yen Li, Yoshihito K...
ICNP
2007
IEEE
14 years 3 months ago
Distributed Delay Estimation and Call Admission Control in IEEE 802.11 WLANs
—Voice over WiFi (VoWiFi) will soon be the main alternative to cellular phones. Providing a satisfactory user experience remains difficult, however. We focus on Call Admission C...
Kenta Yasukawa, Andrea G. Forte, Henning Schulzrin...