Sciweavers

54 search results - page 4 / 11
» Proving Copyless Message Passing
Sort
View
IC
2003
15 years 1 months ago
Efficiency of Soap Versus JMS
Parallel application programmers and software engineers have a variety of paradigms at their disposal. Some of the tools include traditional environments such as Parallel Virtual ...
Roger Eggen, Suresh Sunku
TIT
2008
129views more  TIT 2008»
14 years 11 months ago
Serial Schedules for Belief-Propagation: Analysis of Convergence Time
Abstract--Low-Density Parity-Check (LDPC) codes are usually decoded by running an iterative belief-propagation algorithm over the factor graph of the code. In the traditional messa...
Jacob Goldberger, Haggai Kfir
IJNSEC
2010
133views more  IJNSEC 2010»
14 years 6 months ago
Verifiable Attribute Based Encryption
In this paper, we construct two verifiable attribute-based encryption (VABE) schemes. One is with a single authority, and the other is with multi authorities. Not only our schemes ...
Qiang Tang, Dongyao Ji
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
14 years 9 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
SIGMETRICS
2010
ACM
223views Hardware» more  SIGMETRICS 2010»
15 years 4 months ago
Self-synchronizing properties of CSMA wireless multi-hop networks
We show that CSMA is able to spontaneously synchronize transmissions in a wireless network with constant-size packets, and that this property can be used to devise efficient synch...
Kuang Xu, Olivier Dousse, Patrick Thiran