Sciweavers

3972 search results - page 56 / 795
» Design of the iSCSI Protocol
Sort
View
CORR
2011
Springer
146views Education» more  CORR 2011»
13 years 23 days ago
Exploratory simulation of an Intelligent Iris Verifier Distributed System
— This paper discusses some topics related to the latest trends in the field of evolutionary approaches to iris recognition. It presents the results of an exploratory experimenta...
Nicolaie Popescu-Bodorin, Valentina E. Balas
SP
2008
IEEE
195views Security Privacy» more  SP 2008»
14 years 3 months ago
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
We study formal security properties of a state-of-the-art protocol for secure file sharing on untrusted storage, in the automatic protocol verifier ProVerif. As far as we know, ...
Bruno Blanchet, Avik Chaudhuri
ISCIS
2004
Springer
14 years 2 months ago
Correctness Requirements for Multiagent Commitment Protocols
Abstract. Commitments are a powerful abstraction for representing the interactions between agents. Commitments capture the content of the interactions declaratively and allow agent...
Pinar Yolum
FPL
1997
Springer
123views Hardware» more  FPL 1997»
14 years 1 months ago
P4: A platform for FPGA implementation of protocol boosters
Protocol Boosters are functional elements, inserted anddeleted fromnetwork protocol stacks on an as-neededbasis. The Protocol Booster design methodology attempts to improve end-to-...
Ilija Hadzic, Jonathan M. Smith
HPCC
2005
Springer
14 years 2 months ago
Lazy Home-Based Protocol: Combining Homeless and Home-Based Distributed Shared Memory Protocols
Abstract. This paper presents our novel protocol design and implementation of an all-software page-based DSM system. The protocol combines the advantages of homeless and home-based...
Byung-Hyun Yu, Paul Werstein, Martin K. Purvis, St...