Sciweavers

1565 search results - page 204 / 313
» Optimizing Layered Communication Protocols
Sort
View
148
Voted
JACM
2006
146views more  JACM 2006»
15 years 3 months ago
Limits on the ability of quantum states to convey classical messages
We revisit the problem of conveying classical messages by transmitting quantum states, and derive new, optimal bounds on the number of quantum bits required for this task. Much of...
Ashwin Nayak, Julia Salzman
149
Voted
MOBICOM
2006
ACM
15 years 9 months ago
Optimal CWmin selection for achieving proportional fairness in multi-rate 802.11e WLANs: test-bed implementation and evaluation
We investigate the optimal selection of minimum contention window values to achieve proportional fairness in a multirate IEEE 802.11e test-bed. Unlike other approaches, the propos...
Vasilios A. Siris, George Stamatakis
142
Voted
CRYPTO
2007
Springer
133views Cryptology» more  CRYPTO 2007»
15 years 9 months ago
On Secure Multi-party Computation in Black-Box Groups
Abstract. We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function fG(x1, . . . , xn) = x1 · x...
Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxio...
127
Voted
ACMSE
2007
ACM
15 years 7 months ago
Chinese remainder theorem based group key management
In this paper, we present two new centralized group key management protocols based on the Chinese Remainder Theorem (CRT). By shifting more computing load onto the key server we o...
Xinliang Zheng, Chin-Tser Huang, Manton M. Matthew...
64
Voted
ICC
2007
IEEE
15 years 10 months ago
Measurement and Evaluation of ENUM Server Performance
Abstract—ENUM is a DNS-based protocol standard for mapping E.164 telephone numbers to Internet Uniform Resource Identifiers (URIs). It places unique requirements on the existing...
Charles Shen, Henning Schulzrinne