Sciweavers

330 search results - page 45 / 66
» Controlling data disclosure in computational PIR protocols
Sort
View
ISCA
1998
IEEE
114views Hardware» more  ISCA 1998»
14 years 10 days ago
Tempest and Typhoon: User-Level Shared Memory
Future parallel computers must efficiently execute not only hand-coded applications but also programs written in high-level, parallel programming languages. Today's machines ...
Steven K. Reinhardt, James R. Larus, David A. Wood
VLSID
2008
IEEE
122views VLSI» more  VLSID 2008»
14 years 9 months ago
A Module Checking Based Converter Synthesis Approach for SoCs
Protocol conversion involves the use of a converter to control communication between two or more protocols such that desired system-level specifications can be satisfied. We invest...
Roopak Sinha, Partha S. Roop, Samik Basu
ICIC
2005
Springer
14 years 2 months ago
Performance Comparison of SCTP and TCP over Linux Platform
Stream Control Transmission Protocol (SCTP) is the third transport layer protocol next to TCP and UDP. The SCTP provides some distinctive features over the TCP. This paper is purpo...
Jong-Shik Ha, Sang-Tae Kim, Seok Joo Koh
ICDE
2007
IEEE
164views Database» more  ICDE 2007»
14 years 3 months ago
Secure Mediation of Join Queries by Processing Ciphertexts
In a secure mediated information system, confidentiality is one of the main concerns when transmitting data from datasources to clients via a mediator. We present three approache...
Joachim Biskup, Christian Tsatedem, Lena Wiese
RTSS
2007
IEEE
14 years 3 months ago
Rendezvous Planning in Mobility-Assisted Wireless Sensor Networks
Recent research shows that significant energy saving can be achieved in wireless sensor networks by using mobile elements (MEs) capable of carrying data mechanically. However, th...
Guoliang Xing, Tian Wang, Zhihui Xie, Weijia Jia