Sciweavers

764 search results - page 115 / 153
» Reputable Mix Networks
Sort
View
VOTEID
2007
Springer
14 years 1 months ago
Threat Analysis of a Practical Voting Scheme with Receipts
Kutylowski et al. have introduced a voter-verifiable electronic voting scheme ”a practical voting scheme with receipts”, which provides each voter with a receipt. The voter ca...
Sébastien Foulle, Steve Schneider, Jacques ...
MICRO
2006
IEEE
79views Hardware» more  MICRO 2006»
14 years 1 months ago
Fair Queuing Memory Systems
We propose and evaluate a multi-thread memory scheduler that targets high performance CMPs. The proposed memory scheduler is based on concepts originally developed for network fai...
Kyle J. Nesbit, Nidhi Aggarwal, James Laudon, Jame...
P2P
2006
IEEE
120views Communications» more  P2P 2006»
14 years 1 months ago
Risk Driven Semantic P2P Service Retrieval
In this paper, we present a novel approach, named RS2D, to risk driven semantic service query routing in unstructured, so called pure P2P networks. Following the RS2D protocol, ea...
Matthias Klusch, Ulrich Basters
ISCAS
2005
IEEE
173views Hardware» more  ISCAS 2005»
14 years 1 months ago
Slack-time aware routing in NoC systems
—Efficient routing schemes are essential if Network on Chip (NoC) architectures are to be used for implementing multi-core systems for real-time multi-media applications. These s...
Daniel Andreasson, Shashi Kumar
AMEC
2004
Springer
14 years 1 months ago
Three Automated Stock-Trading Agents: A Comparative Study
Abstract. This paper documents the development of three autonomous stocktrading agents within the framework of the Penn Exchange Simulator (PXS), a novel stock-trading simulator th...
Alexander A. Sherstov, Peter Stone