Sciweavers

483 search results - page 6 / 97
» Patterns of Protocols
Sort
View
HPCA
1998
IEEE
13 years 12 months ago
Efficiently Adapting to Sharing Patterns in Software DSMs
In this paper we introduce a page-based Lazy Release Consistency protocol called ADSM that constantly and efficiently adapts to the applications' sharing patterns. Adaptation...
Luiz Rodolpho Monnerat, Ricardo Bianchini
PKC
2010
Springer
118views Cryptology» more  PKC 2010»
13 years 9 months ago
Text Search Protocols with Simulation Based Security
This paper presents an efficient protocol for securely computing the fundamental problem of pattern matching. This problem is defined in the two-party setting, where party P1 hold...
Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen
ICNP
2009
IEEE
14 years 2 months ago
Topology Control Protocol Using Sectorized Antennas in Dense 802.11 Wireless Networks
—We introduce a measurement-based optimization framework for topology control in dense 802.11 networks using sectorized antennas. We first formulate a topology control optimizat...
Anand Prabhu Subramanian, Henrik Lundgren, Theodor...
ICC
2007
IEEE
142views Communications» more  ICC 2007»
14 years 2 months ago
Filtering Spam Email Based on Retry Patterns
— A central problem in today’s Internet is unsolicited bulk email: spam. The SMTP protocol lacks a mechanism for verifying the source of a message, and respective protocol exte...
Peter Lieven, Björn Scheuermann, Michael Stin...
IFIP
2009
Springer
14 years 2 months ago
Trusted Multiplexing of Cryptographic Protocols
Abstract. We present an analysis that determines when it is possible to multiplex a pair of cryptographic protocols. We present a transformation that improves the coverage of this ...
Jay A. McCarthy, Shriram Krishnamurthi