Sciweavers

106 search results - page 8 / 22
» Two New Efficient PIR-Writing Protocols
Sort
View
TMC
2010
130views more  TMC 2010»
14 years 10 months ago
Efficient Coverage Maintenance Based on Probabilistic Distributed Detection
—Many wireless sensor networks require sufficient sensing coverage over long periods of time. To conserve energy, a coverage maintenance protocol achieves desired coverage by act...
Guoliang Xing, Xiangmao Chang, Chenyang Lu, Jianpi...
PPL
2002
108views more  PPL 2002»
14 years 11 months ago
An Efficient Implementation of the BSP Programming Library for VIA
Virtual Interface Architecture(VIA) is a light-weight protocol for protected user-level zero-copy communication. In spite of the promised high performance of VIA, previous MPI imp...
Yang-Suk Kee, Soonhoi Ha
ICC
2009
IEEE
159views Communications» more  ICC 2009»
15 years 6 months ago
An Enhanced Multiple-Feedback Algorithm for RFID MAC Protocols
Abstract— This paper introduces two new tree-based anticollision schemes using multiple feedback symbols for uplink tag random access of emerging radio frequency identification (...
You-Chang Ko, Sumit Roy, Choong-Ho Cho, Hyong-Woo ...
ICDCS
1996
IEEE
15 years 4 months ago
How to Recover Efficiently and Asynchronously when Optimism Fails
We propose a new algorithm for recovering asynchronously from failures in a distributed computation. Our algorithm is based on two novel concepts - a fault-tolerant vector clock t...
Om P. Damani, Vijay K. Garg
CCS
2010
ACM
14 years 12 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...