Sciweavers

1195 search results - page 150 / 239
» What, Where
Sort
View
COORDINATION
2006
Springer
14 years 21 days ago
Using Lime to Support Replication for Availability in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) define a challenging computing scenario where access to resources is restrained by connectivity among hosts. Replication offers an opportunity to in...
Amy L. Murphy, Gian Pietro Picco
FDTC
2006
Springer
74views Cryptology» more  FDTC 2006»
14 years 19 days ago
Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection
Traditional hardware error detection methods based on linear codes make assumptions about the typical or expected errors and faults and concentrate the detection power towards the ...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
EUROCRYPT
2000
Springer
14 years 17 days ago
Minimal-Latency Secure Function Evaluation
Sander, Young and Yung recently exhibited a protocol for computing on encrypted inputs, for functions computable in NC1 . In their variant of secure function evaluation, Bob (the &...
Donald Beaver
ICS
2000
Tsinghua U.
14 years 17 days ago
Characterizing processor architectures for programmable network interfaces
The rapid advancements of networking technology have boosted potential bandwidth to the point that the cabling is no longer the bottleneck. Rather, the bottlenecks lie at the cros...
Patrick Crowley, Marc E. Fiuczynski, Jean-Loup Bae...
KES
2000
Springer
14 years 16 days ago
Agent and user inhabited virtual communities: a case study
: We report about ongoing research in a virtual reality environment where visitors can interact with agents that help them to obtain information, to peform certain transactions and...
Anton Nijholt