Sciweavers

1144 search results - page 92 / 229
» Protocol Implementation in a Vertically Structured Operating...
Sort
View
73
Voted
SOSP
2007
ACM
15 years 6 months ago
Generalized file system dependencies
Reliable storage systems depend in part on “write-before” relationships where some changes to stable storage are delayed until other changes commit. A journaled file system, ...
Christopher Frost, Mike Mammarella, Eddie Kohler, ...
CONEXT
2009
ACM
14 years 11 months ago
RFDump: an architecture for monitoring the wireless ether
Networking researchers have been using tools like wireshark and tcpdump to sniff packets on physical links that use different types of datalink protocols, e.g. Ethernet or 802.11,...
Kaushik Lakshminarayanan, Samir Sapra, Srinivasan ...
INFOCOM
2005
IEEE
15 years 3 months ago
Joint congestion control and media access control design for ad hoc wireless networks
Abstract— We present a model for the joint design of congestion control and media access control (MAC) for ad hoc wireless networks. Using contention graph and contention matrix,...
Lijun Chen, Steven H. Low, John C. Doyle
ICRA
2003
IEEE
95views Robotics» more  ICRA 2003»
15 years 3 months ago
Smooth feedback control algorithms for distributed manipulators
Abstract— This paper introduces a smooth control algorithm for controlling fully actuated distributed manipulation systems that operate by frictional contact. The control law sca...
Todd D. Murphey, Joel W. Burdick
CRYPTO
2007
Springer
133views Cryptology» more  CRYPTO 2007»
15 years 3 months ago
On Secure Multi-party Computation in Black-Box Groups
Abstract. We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function fG(x1, . . . , xn) = x1 · x...
Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxio...