Sciweavers

26 search results - page 5 / 6
» A Reservation-Based Extended Transaction Protocol
Sort
View
IWMM
1998
Springer
115views Hardware» more  IWMM 1998»
13 years 9 months ago
One-Bit Counts between Unique and Sticky
Stoye's one-bit reference tagging scheme can be extended to local counts of two or more via two strategies. The first, suited to pure register transactions, is a cache of ref...
David J. Roth, David S. Wise
COMCOM
2007
125views more  COMCOM 2007»
13 years 5 months ago
Guaranteeing the network lifetime in wireless sensor networks: A MAC layer approach
Energy is the most crucial but scarce resource in wireless sensor networks (WSNs). A wealth of MAC protocols are proposed only to prolong the network lifetime for energy-efficienc...
Yongsub Nam, Taekyoung Kwon, Hojin Lee, Hakyung Ju...
SAC
2004
ACM
13 years 10 months ago
Web Services for E-commerce: guaranteeing security access and quality of service
Being E-commerce one of the most critical Internet application, it is fundamental to employ technologies which guarantee not only secure transactions but also an adequate quality ...
Mario Bravetti, Roberto Lucchi, Gianluigi Zavattar...
JUCS
2008
156views more  JUCS 2008»
13 years 5 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
NOCS
2008
IEEE
13 years 11 months ago
Debugging Distributed-Shared-Memory Communication at Multiple Granularities in Networks on Chip
We present a methodology to debug a SOC by concentrating on its communication. Our extended communication model includes a) multiple signal groups per interface protocol at each I...
Bart Vermeulen, Kees Goossens, Siddharth Umrani