Sciweavers

422 search results - page 15 / 85
» Protocol Specialization
Sort
View
ICS
2010
Tsinghua U.
15 years 11 months ago
Game Theory with Costly Computation: Formulation and Application to Protocol Security
: We develop a general game-theoretic framework for reasoning about strategic agents performing possibly costly computation. In this framework, many traditional game-theoretic resu...
Joseph Y. Halpern, Rafael Pass
136
Voted
ISW
2010
Springer
14 years 11 months ago
Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups
A Private Information Retrieval (PIR) protocol allows a database user, or client, to obtain information from a data- base in a manner that prevents the database from knowing which...
Jonathan T. Trostle, Andy Parrish
119
Voted
GI
2001
Springer
15 years 6 months ago
M-YESSIR: A Low Latency Reservation Protocol for Mobile-IP Networks
Abstract—Advanced network and media applications such as multimedia streaming and Internet telephony are becoming an integral part of the Internet. Reservation protocols, such as...
Hromuzd Khosravi, Daniel Reininger, Maximilian Ott...
CONIELECOMP
2011
IEEE
14 years 5 months ago
DSRP: Distributed SensorWeb Routing Protocol
—We propose a new multi-hop routing protocol for wireless sensor networks, suited for monitoring and control applications. The aim of this research is to adapt flat and hierarch...
Abhinav Valada, David Kohanbash, George Kantor
ICS
1999
Tsinghua U.
15 years 6 months ago
Fast cluster failover using virtual memory-mapped communication
This paper proposes a novel way to use virtual memorymapped communication (VMMC) to reduce the failover time on clusters. With the VMMC model, applications’ virtual address spac...
Yuanyuan Zhou, Peter M. Chen, Kai Li