Sciweavers

4761 search results - page 629 / 953
» Performance of Protocols
Sort
View
134
Voted
JUCS
2008
156views more  JUCS 2008»
15 years 4 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng

Publication
304views
17 years 3 months ago
A Binary Feedback Scheme for Congestion Avoidance in Computer Networks with Connectionless Network Layer
We propose a scheme for congestion avoidance in networks using a connectionless protocol at the network layer. The scheme uses a minimal amount of feedback from the network to the ...
K. Ramakrishnan and R. Jain
160
Voted
MICCAI
2003
Springer
16 years 5 months ago
Exploratory Identification of Cardiac Noise in fMRI Images
A fast exploratory framework for extracting cardiac noise signals contained in rest-case fMRI images is presented. Highly autocorrelated, independent components of the input time ...
Lilla Zöllei, Lawrence P. Panych, W. Eric L. ...
WWW
2005
ACM
16 years 5 months ago
A language for expressing user-context preferences in the web
In this paper, we introduce WPML (WebProfiles Markup Language) for expressing user-context preferences information in the Web. Using WPML a service provider can negotiate and obta...
Diego López de Ipiña, Juan Ignacio V...
HPCA
2004
IEEE
16 years 5 months ago
The Thrifty Barrier: Energy-Aware Synchronization in Shared-Memory Multiprocessors
Much research has been devoted to making microprocessors energy-efficient. However, little attention has been paid to multiprocessor environments where, due to the co-operative na...
Jian Li, José F. Martínez, Michael C...