Sciweavers

4761 search results - page 648 / 953
» Performance of Protocols
Sort
View
ISWC
1999
IEEE
15 years 9 months ago
When Cyborgs Meet: Building Communities of Cooperating Wearable Agents
This paper introduces the notion of a Wearable Community as a group of wearable users who cooperate for their mutual benefit. In such a community, wearable computers act as person...
Gerd Kortuem, Jay Schneider, Jim Suruda, Stephen F...
WETICE
1998
IEEE
15 years 9 months ago
Using SESAME's GSS-API to add Security to Unix Applications
SESAME is a security architecture that starts from the Kerberos protocol and adds to it public-key based authentication, role based access control, delegation of rights and an ext...
Paul Ashley, Mark Vandenwauver, Mark Rutherford, S...
PODC
1998
ACM
15 years 9 months ago
Amortizing Randomness in Private Multiparty Computations
We study the relationship between the number of rounds needed to repeatedly perform a private computation i.e., where there are many sets of inputs sequentially given to the play...
Eyal Kushilevitz, Rafail Ostrovsky, Adi Rosé...
ISSS
1997
IEEE
103views Hardware» more  ISSS 1997»
15 years 9 months ago
Fast and Extensive System-Level Memory Exploration for ATM Applications
In this paper, our memory architecture exploration methodology and CAD techniques for network protocol applications are presented. Prototype tools have been implemented, and appli...
Peter Slock, Sven Wuytack, Francky Catthoor, Gjalt...
135
Voted
PDP
1997
IEEE
15 years 9 months ago
The controlled logical clock--a global time for trace-based software monitoring of parallel applications in workstation clusters
Event tracing and monitoring of parallel applications are difficult if each processor has its own unsynchronized clock. A survey is given on several strategies to generate a glob...
Rolf Rabenseifner