Sciweavers

54 search results - page 4 / 11
» Proving Copyless Message Passing
Sort
View
IC
2003
14 years 11 months ago
Efficiency of Soap Versus JMS
Parallel application programmers and software engineers have a variety of paradigms at their disposal. Some of the tools include traditional environments such as Parallel Virtual ...
Roger Eggen, Suresh Sunku
TIT
2008
129views more  TIT 2008»
14 years 9 months ago
Serial Schedules for Belief-Propagation: Analysis of Convergence Time
Abstract--Low-Density Parity-Check (LDPC) codes are usually decoded by running an iterative belief-propagation algorithm over the factor graph of the code. In the traditional messa...
Jacob Goldberger, Haggai Kfir
IJNSEC
2010
133views more  IJNSEC 2010»
14 years 4 months ago
Verifiable Attribute Based Encryption
In this paper, we construct two verifiable attribute-based encryption (VABE) schemes. One is with a single authority, and the other is with multi authorities. Not only our schemes ...
Qiang Tang, Dongyao Ji
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
14 years 7 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
SIGMETRICS
2010
ACM
223views Hardware» more  SIGMETRICS 2010»
15 years 2 months ago
Self-synchronizing properties of CSMA wireless multi-hop networks
We show that CSMA is able to spontaneously synchronize transmissions in a wireless network with constant-size packets, and that this property can be used to devise efficient synch...
Kuang Xu, Olivier Dousse, Patrick Thiran