Sciweavers

1092 search results - page 214 / 219
» Located Operators
Sort
View
JCS
2006
116views more  JCS 2006»
13 years 9 months ago
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks
We present GKMPAN, an efficient and scalable group rekeying protocol for secure multicast in ad hoc networks. Our protocol exploits the property of ad hoc networks that each membe...
Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jaj...
MICRO
2008
IEEE
137views Hardware» more  MICRO 2008»
13 years 9 months ago
Verification of chip multiprocessor memory systems using a relaxed scoreboard
Verification of chip multiprocessor memory systems remains challenging. While formal methods have been used to validate protocols, simulation is still the dominant method used to ...
Ofer Shacham, Megan Wachs, Alex Solomatnikov, Amin...
MST
2006
136views more  MST 2006»
13 years 9 months ago
Simple Efficient Load-Balancing Algorithms for Peer-to-Peer Systems
Load balancing is a critical issue for the efficient operation of peerto-peer networks. We give two new load-balancing protocols whose provable performance guarantees are within a...
David R. Karger, Matthias Ruhl
INTERNET
2007
113views more  INTERNET 2007»
13 years 9 months ago
REST Eye for the SOA Guy
it’s hardly Earth-shattering: abstracting your business services and separating them from your applications can yield an overall system that’s easier to build, maintain, and ex...
Steve Vinoski
JEI
2000
134views more  JEI 2000»
13 years 9 months ago
Pattern matching using the blur hit - miss transform
The usefulness of the hit-miss transform (HMT) and related transforms for pattern matching in document image applications is examined. Although the HMT is sensitive to the types o...
Dan S. Bloomberg, Luc Vincent