Sciweavers

44 search results - page 7 / 9
» Version vector protocols implementing session guarantees
Sort
View
PIMRC
2010
IEEE
13 years 5 months ago
Self-optimizing routing in MANETs with multi-class flows
In this paper we show how game theory and Gibbs sampling techniques can be used to design a self-optimizing algorithm for minimizing end-to-end delays for all flows in a multi-clas...
Pierre Coucheney, Bruno Gaujal, Corinne Touati
IACR
2011
192views more  IACR 2011»
12 years 7 months ago
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message proc...
Daniel Engels, Markku-Juhani O. Saarinen, Peter Sc...
SMA
2008
ACM
157views Solid Modeling» more  SMA 2008»
13 years 7 months ago
Interactive physically-based shape editing
We present an alternative approach to standard geometric shape editing using physically-based simulation. With our technique, the user can deform complex objects in real-time. The...
Johannes Mezger, Bernhard Thomaszewski, Simon Pabs...
IPPS
2010
IEEE
13 years 5 months ago
Consistency in hindsight: A fully decentralized STM algorithm
Abstract--Software transactional memory (STM) algorithms often rely on centralized components to achieve atomicity, isolation and consistency. In a distributed setting, centralized...
Annette Bieniusa, Thomas Fuhrmann
RTAS
2000
IEEE
13 years 12 months ago
Chocolate: A Reservation-Based Real-Time Java Environment on Windows/NT
In this paper, we present Chocolate, a reservation-based Real-Time Java run-time environment that runs on Windows NT. We first present a brief overview of the emerging RealTime Ja...
Dionisio de Niz, Ragunathan Rajkumar