Sciweavers

880 search results - page 145 / 176
» Data Dependency based Parallel Simulation of Wireless Networ...
Sort
View
ICISC
2008
103views Cryptology» more  ICISC 2008»
14 years 11 months ago
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
Secure Evaluation of Private Functions (PF-SFE) allows two parties to compute a private function which is known by one party only on private data of both. It is known that PF-SFE c...
Ahmad-Reza Sadeghi, Thomas Schneider 0003
95
Voted
IPPS
2007
IEEE
15 years 4 months ago
Adaptive Distributed Database Replication Through Colonies of Pogo Ants
We address the problem of optimizing the distribution of partially replicated databases over a computer network. Replication is used to increase data availability in the presence ...
Sarah Abdul-Wahid, Razvan Andonie, Joseph Lemley, ...
GLOBECOM
2010
IEEE
14 years 7 months ago
Cognitive Network Inference through Bayesian Network Analysis
Cognitive networking deals with applying cognition to the entire network protocol stack for achieving stack-wide as well as network-wide performance goals, unlike cognitive radios ...
Giorgio Quer, Hemanth Meenakshisundaram, Tamma Bhe...
GLOBECOM
2007
IEEE
15 years 4 months ago
Enhancing TCP Over HSDPA by Cross-Layer Signalling
Abstract— A comprehensive performance evaluation of a crosslayer solution to increase users’ downlink data rates over HSDPA is provided. The solution consists of a proxy entity...
Marco Fiorenzi, Daniele Girella, Niels Möller...
IFIP
2009
Springer
15 years 2 months ago
Secure Information Flow for Distributed Systems
We present an abstract language for distributed systems of processes with local memory and private communication channels. Communication between processes is done via messaging. Th...
Rafael Alpízar, Geoffrey Smith