Sciweavers

404 search results - page 44 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
111
Voted
CCR
2004
84views more  CCR 2004»
15 years 3 months ago
On making SCTP robust to spurious retransmissions
Network anomalies such as packet reordering and delay spikes can result in spurious retransmissions and degrade performance of reliable transport protocols such as TCP and SCTP. P...
Sourabh Ladha, Stephan Baucke, Reiner Ludwig, Paul...
136
Voted
ADHOC
2004
118views more  ADHOC 2004»
15 years 3 months ago
A review of routing protocols for mobile ad hoc networks
The 1990s have seen a rapid growth of research interests in mobile ad hoc networking. The infrastructureless and the dynamic nature of these networks demands new set of networking...
Mehran Abolhasan, Tadeusz A. Wysocki, Eryk Dutkiew...
ICPP
1997
IEEE
15 years 7 months ago
The Affinity Entry Consistency Protocol
In this paper we propose a novel software-only distributed sharedmemory system (SW-DSM), the Affinity Entry Consistency (AEC) protocol. The protocol is based on Entry Consistency ...
Cristiana Bentes Seidel, Ricardo Bianchini, Claudi...
129
Voted
CSB
2005
IEEE
143views Bioinformatics» more  CSB 2005»
15 years 9 months ago
Multivariate gene selection: Does it help
When building predictors of disease state based on gene expression data, gene selection is performed in order to achieve a good performance and to identify a relevant subset of ge...
Carmen Lai, Marcel J. T. Reinders
123
Voted
FPT
2005
IEEE
181views Hardware» more  FPT 2005»
15 years 9 months ago
Hardware-Accelerated SSH on Self-Reconfigurable Systems
The performance of security applications can be greatly improved by accelerating the cryptographic algorithms in hardware. In this paper, an implementation of the Secure Shell (SS...
Ivan Gonzalez, Francisco J. Gomez-Arribas, Sergio ...