Sciweavers

3972 search results - page 112 / 795
» Design of the iSCSI Protocol
Sort
View
JACIII
2008
75views more  JACIII 2008»
13 years 10 months ago
I3P: A Protocol for Increasing Reliability and Responsiveness in Massively Multiplayer Games
Developing broadband and internet technologies offers possibilities for new ways of minimizing the server bottleneck in online gaming as well as an increase in response and reliab...
Jeremy Kackley, Matthew Gambrell, Jean Gourd
MOBISYS
2008
ACM
14 years 10 months ago
Improving wireless privacy with an identifier-free link layer protocol
We present the design and evaluation of an 802.11-like wireless link layer protocol that obfuscates all transmitted bits to increase privacy. This includes explicit identifiers su...
Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayos...
ATAL
2009
Springer
14 years 1 months ago
Choice, interoperability, and conformance in interaction protocols and service choreographies
Many real-world applications of multiagent systems require independently designed (heterogeneous) and operated (autonomous) agents to interoperate. We consider agents who offer bu...
Matteo Baldoni, Cristina Baroglio, Amit K. Chopra,...
DCOSS
2009
Springer
14 years 4 months ago
Speed Dating Despite Jammers
Many wireless standards and protocols today, such as WLAN and Bluetooth, operate on similar frequency bands. While this permits an efficient usage of the limited medium capacity, ...
Dominic Meier, Yvonne Anne Pignolet, Stefan Schmid...
CRYPTO
2010
Springer
167views Cryptology» more  CRYPTO 2010»
13 years 11 months ago
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost
Multiparty computation protocols have been known for more than twenty years now, but due to their lack of efficiency their use is still limited in real-world applications: the goal...
Ivan Damgård, Claudio Orlandi