Sciweavers

1087 search results - page 133 / 218
» Distributed Oblivious Transfer
Sort
View
EUROPAR
2001
Springer
15 years 7 months ago
Optimal Polling for Latency-Throughput Tradeoffs in Queue-Based Network Interfaces for Clusters
We consider a networking subsystem for message–passing clusters that uses two unidirectional queues for data transfers between the network interface card (NIC) and the lower prot...
Dmitry Ponomarev, Kanad Ghose, Eugeny Saksonov
139
Voted
UML
2001
Springer
15 years 7 months ago
Using Alloy and UML/OCL to Specify Run-Time Configuration Management: A Case Study
: There are many different ways to specify the requirements of complex software systems, and the optimal methods often vary according to the problem domain. We apply and compare tw...
Geri Georg, Jores Bieman, Robert B. France
133
Voted
IDMS
1998
Springer
141views Multimedia» more  IDMS 1998»
15 years 6 months ago
An Image Coding and Reconstruction Scheme for Mobile Computing
An asynchronous transfer mode (ATM) wireless network has bursty and high error rates. To combat the contiguous bit loss due to damaged or dropped packets, this paper presents a cod...
Edward Y. Chang
132
Voted
ACSE
1996
ACM
15 years 6 months ago
Collaborative hypermedia education with the VIENA classroom system
VIENA Classroom is a collaborative hypermedia education system which is a component of the Virtual Interactive Environment for Workgroups (VIEW), a collaborative environment based...
Werner Winiwarter, Osami Kagawa, Shin'ichi Konomi,...
122
Voted
ASIACRYPT
2000
Springer
15 years 6 months ago
Round-Efficient Conference Key Agreement Protocols with Provable Security
A conference key protocol allows a group of participants to establish a secret communication (conference) key so that all their communications thereafter are protected by the key. ...
Wen-Guey Tzeng, Zhi-Jia Tzeng