Sciweavers

403 search results - page 38 / 81
» An algebra for commitment protocols
Sort
View
IACR
2011
105views more  IACR 2011»
13 years 11 months ago
Leakage Tolerant Interactive Protocols
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage to...
Nir Bitansky, Ran Canetti, Shai Halevi
SAC
2003
ACM
15 years 5 months ago
A Dynamic Data/Currency Protocol for Mobile Database Design and Reconfiguration
This paper presents flexible protocols for dynamic database design and reconfiguration, enabling mobile database to be designed in such a way that data location, replication and e...
Yanli Xia, Abdelsalam Helal
NOSSDAV
2009
Springer
15 years 6 months ago
Probabilistic event resolution with the pairwise random protocol
Peer-to-peer distributed virtual environments (DVE's) distribute state tracking and state transitions. Many DVE's - such as online games - require ways to fairly determi...
John L. Miller, Jon Crowcroft
VLDB
1995
ACM
94views Database» more  VLDB 1995»
15 years 3 months ago
Value-cognizant Speculative Concurrency Control
We describe SCC-kS, a Speculative Concurrency Control (SCC) algorithm that allows a DBMS to use efficiently the extra computing resources available in the system to increase the l...
Azer Bestavros, Spyridon Braoudakis
MICRO
2006
IEEE
105views Hardware» more  MICRO 2006»
15 years 5 months ago
Distributed Microarchitectural Protocols in the TRIPS Prototype Processor
Growing on-chip wire delays will cause many future microarchitectures to be distributed, in which hardware resources within a single processor become nodes on one or more switched...
Karthikeyan Sankaralingam, Ramadass Nagarajan, Rob...