Sciweavers

329 search results - page 5 / 66
» Requirements for and Evaluation of RMI Protocols for Scienti...
Sort
View
POLICY
2007
Springer
14 years 1 months ago
Performance Evaluation of Privacy-Preserving Policy Reconciliation Protocols
The process of policy reconciliation allows multiple parties with possibly different policies to resolve differences in order to reach an agreement on an acceptable policy. Previo...
Jonathan Voris, Sotiris Ioannidis, Susanne Wetzel,...
CRYPTO
2001
Springer
95views Cryptology» more  CRYPTO 2001»
14 years 2 hour ago
Robustness for Free in Unconditional Multi-party Computation
We present a very efficient multi-party computation protocol unconditionally secure against an active adversary. The security is maximal, i.e., active corruption of up to t < n/...
Martin Hirt, Ueli M. Maurer
CLUSTER
2007
IEEE
13 years 7 months ago
Predictive performance modelling of parallel component compositions
Large-scale scientific computing applications frequently make use of closely-coupled distributed parallel components. The performance of such applications is therefore dependent o...
Lei Zhao, Stephen A. Jarvis
WONS
2005
IEEE
14 years 1 months ago
The Pulse Protocol: Mobile Ad hoc Network Performance Evaluation
— We present a performance evaluation of the Pulse protocol operating in a peer-to-peer mobile ad hoc network environment. The Pulse protocol utilizes a periodic flood (the puls...
Baruch Awerbuch, David Holmer, Herbert Rubens
WIMOB
2008
IEEE
14 years 1 months ago
A Protocol for Pervasive Distributed Computing Reliability
Abstract—The adoption of new hardware and software architectures will make future generations of pervasive devices more flexible and extensible. Networks of computational nodes ...
Alberto Ferrante, Roberto Pompei, Anastasia Stulov...