Sciweavers

187 search results - page 20 / 38
» Utility-Based Role Exchange
Sort
View
TGC
2007
Springer
15 years 10 months ago
A Protocol Compiler for Secure Sessions in ML
Distributed applications can be structured using sessions that specify flows of messages between roles. We design a small specific language to declare sessions. We then build a c...
Ricardo Corin, Pierre-Malo Deniélou
TON
2010
99views more  TON 2010»
14 years 10 months ago
Rate Control With Pairwise Intersession Network Coding
In this paper, we develop a distributed rate-control algorithm for networks with multiple unicast sessions when network coding is allowed across different sessions. Building on rec...
Abdallah Khreishah, Chih-Chun Wang, Ness B. Shroff
HICSS
2003
IEEE
84views Biometrics» more  HICSS 2003»
15 years 9 months ago
Constructing Electronic Marketplaces using Peer-to-Peer Technology
Due to the widespread appearance of filesharing systems like Napster, the peer-to-peer concept has recently become well known. So far, these file-sharing systems have been used fo...
Nick Gehrke, Matthias Schumann
PODS
2012
ACM
253views Database» more  PODS 2012»
13 years 6 months ago
Local transformations and conjunctive-query equivalence
Over the past several decades, the study of conjunctive queries has occupied a central place in the theory and practice of database systems. In recent years, conjunctive queries h...
Ronald Fagin, Phokion G. Kolaitis
NDSS
2007
IEEE
15 years 10 months ago
Secret Handshakes with Dynamic and Fuzzy Matching
The need for communication privacy over public networks is of growing concern in today’s society. As a result, privacy-preserving authentication and key exchange protocols have ...
Giuseppe Ateniese, Jonathan Kirsch, Marina Blanton