Sciweavers

4761 search results - page 47 / 953
» Performance of Protocols
Sort
View
110
Voted
PKC
2010
Springer
119views Cryptology» more  PKC 2010»
15 years 5 months ago
Efficient Set Operations in the Presence of Malicious Adversaries
We revisit the problem of constructing efficient secure two-party protocols for the problems of setintersection and set-union, focusing on the model of malicious parties. Our main...
Carmit Hazay, Kobbi Nissim
SIGCOMM
1996
ACM
15 years 7 months ago
Speeding up Protocols for Small Messages
Many techniques have been discovered to improve performance of bulk data transfer protocols which use large messages. This paper describes a technique that improves protocol perfo...
Trevor Blackwell
IPPS
1998
IEEE
15 years 7 months ago
Update Protocols and Iterative Scientific Applications
Software DSMs have been a research topic for over a decade. While good performance has been achieved in some cases, consistent performance has continued to elude researchers. This...
Peter J. Keleher
RTSS
1996
IEEE
15 years 7 months ago
Commit processing in distributed real-time database systems
W e investigate here the performance implications of supporting transaction atomicity in a distributed realtime database system. Using a detailed simulation model of a firm-deadli...
Ramesh Gupta, Jayant R. Haritsa, Krithi Ramamritha...
VALUETOOLS
2006
ACM
112views Hardware» more  VALUETOOLS 2006»
15 years 9 months ago
Performance of ad hoc networks with two-hop relay routing and limited packet lifetime
— Considered is a mobile ad hoc network consisting of three types of nodes (source, destination and relay nodes) and using the two-hop relay routing protocol. Packets at relay no...
Ahmad Al Hanbali, Philippe Nain, Eitan Altman