Sciweavers

986 search results - page 35 / 198
» Simulation Modeling of Weak-Consistency Protocols
Sort
View
JCM
2006
86views more  JCM 2006»
13 years 8 months ago
MAC Layer RFID Protocol for Low Cost Object Identification
In this paper, we introduce a novel medium access control (MAC) protocol for Radio Frequency Identification (RFID) systems. This protocol exploits the Markov Chain Model of Slotted...
Shweta Singh
CTRSA
2008
Springer
111views Cryptology» more  CTRSA 2008»
13 years 10 months ago
Efficient Fully-Simulatable Oblivious Transfer
Oblivious transfer, first introduced by Rabin, is one of the basic building blocks of cryptographic protocols. In an oblivious transfer (or more exactly, in its 1-out-of-2 variant...
Andrew Y. Lindell
ROOM
2000
13 years 10 months ago
Statecharts as Protocols for Objects
For the specification of object-oriented systems, usually several models representing different views are developed. The necessary integration of views is often delayed until impl...
Annette Laue, Matthias Liedtke, Daniel Moldt, Ivan...
DSRT
2004
IEEE
14 years 17 days ago
Implementation of Host-Based Overlay Multicast to Support of Web Based Services for RT-DVS
Growing demand for use of Internet/Web-based services in real-time distributed virtual simulation (RT-DVS) and other real-time applications is fueling extensive interest in overla...
Dennis M. Moen, J. Mark Pullen, Fei Zhao
IPPS
2005
IEEE
14 years 2 months ago
Combinatorial Auction-Based Protocols for Resource Allocation in Grids
In this paper, we introduce the combinatorial auction model for resource management in grids. We propose a combinatorial auction-based resource allocation protocol in which a user...
Anubhav Das, Daniel Grosu