Sciweavers

4761 search results - page 47 / 953
» Performance of Protocols
Sort
View
PKC
2010
Springer
119views Cryptology» more  PKC 2010»
14 years 11 months ago
Efficient Set Operations in the Presence of Malicious Adversaries
We revisit the problem of constructing efficient secure two-party protocols for the problems of setintersection and set-union, focusing on the model of malicious parties. Our main...
Carmit Hazay, Kobbi Nissim
SIGCOMM
1996
ACM
15 years 1 months ago
Speeding up Protocols for Small Messages
Many techniques have been discovered to improve performance of bulk data transfer protocols which use large messages. This paper describes a technique that improves protocol perfo...
Trevor Blackwell
IPPS
1998
IEEE
15 years 2 months ago
Update Protocols and Iterative Scientific Applications
Software DSMs have been a research topic for over a decade. While good performance has been achieved in some cases, consistent performance has continued to elude researchers. This...
Peter J. Keleher
RTSS
1996
IEEE
15 years 1 months ago
Commit processing in distributed real-time database systems
W e investigate here the performance implications of supporting transaction atomicity in a distributed realtime database system. Using a detailed simulation model of a firm-deadli...
Ramesh Gupta, Jayant R. Haritsa, Krithi Ramamritha...
VALUETOOLS
2006
ACM
112views Hardware» more  VALUETOOLS 2006»
15 years 3 months ago
Performance of ad hoc networks with two-hop relay routing and limited packet lifetime
— Considered is a mobile ad hoc network consisting of three types of nodes (source, destination and relay nodes) and using the two-hop relay routing protocol. Packets at relay no...
Ahmad Al Hanbali, Philippe Nain, Eitan Altman