Sciweavers

176 search results - page 11 / 36
» The Cost of Privatization
Sort
View
MICRO
2008
IEEE
118views Hardware» more  MICRO 2008»
14 years 1 months ago
Notary: Hardware techniques to enhance signatures
Hardware signatures have been recently proposed as an efficient mechanism to detect conflicts amongst concurrently running transactions in transactional memory systems (e.g., Bulk...
Luke Yen, Stark C. Draper, Mark D. Hill
IACR
2011
124views more  IACR 2011»
12 years 7 months ago
Using the Cloud to Determine Key Strengths
We develop a new methodology to assess cryptographic key strength using cloud computing, by calculating the true economic cost of (symmetric- or private-) key retrieval for the mos...
Thorsten Kleinjung, Arjen K. Lenstra, Dan Page, Ni...
JSAC
2006
95views more  JSAC 2006»
13 years 7 months ago
Design differentiated service multicast with selfish agents
Differentiated service (DiffServ) is a mechanism to provide the Quality of Service (QoS) with a certain performance guarantee. In this paper, we study how to design DiffServ multic...
Weizhao Wang, Xiang-Yang Li, Zheng Sun
NOMS
2008
IEEE
107views Communications» more  NOMS 2008»
14 years 1 months ago
A Framework for the establishment of inter-domain, on-demand VPNs
– Virtual Private Networks (VPNs) are a popular and cost-effective means to build wide-area corporate networks, since they provide bandwidth, privacy and security for a fraction ...
Alexandre Matos, Fernando Matos, Paulo Simõ...
GECCO
1999
Springer
13 years 11 months ago
Infrastructure Work Order Planning Using Genetic Algorithms
Infrastructure management offices plan and complete several thousand small construction projects annually. Effective planning is vital if the public and private sectors are to mai...
E. William East