• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,975
Next 10 →

Software pipelining: An effective scheduling technique for VLIW machines

by Monica Lam , 1988
"... This paper shows that software pipelining is an effective and viable scheduling technique for VLIW processors. In software pipelining, iterations of a loop in the source program are continuously initiated at constant intervals, before the preceding iterations complete. The advantage of software pipe ..."
Abstract - Cited by 581 (3 self) - Add to MetaCart
hierarchical reduction scheme whereby entire control con-structs are reduced to an object similar to an operation in a basic block. With this scheme, all innermost loops, including those containing conditional statements, can be software pipelined. It also diminishes the start-up cost of loops with small

Scalable Application Layer Multicast

by Suman Banerjee, Bobby Bhattacharjee, Christopher Kommareddy , 2002
"... We describe a new scalable application-layer multicast protocol, specifically designed for low-bandwidth, data streaming applications with large receiver sets. Our scheme is based upon a hierarchical clustering of the application-layer multicast peers and can support a number of different data deliv ..."
Abstract - Cited by 731 (21 self) - Add to MetaCart
We describe a new scalable application-layer multicast protocol, specifically designed for low-bandwidth, data streaming applications with large receiver sets. Our scheme is based upon a hierarchical clustering of the application-layer multicast peers and can support a number of different data

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using a Single Transceiver

by Jungmin So, Nitin Vaidya - In ACM MobiHoc , 2004
"... This paper proposes a medium access control (MAC) protocol for ad hoc wireless networks that utilizes multiple channels dynamically to improve performance. The IEEE 802.11 standard allows for the use of multiple channels available at the physical layer, but its MAC protocol is designed only for a si ..."
Abstract - Cited by 431 (6 self) - Add to MetaCart
This paper proposes a medium access control (MAC) protocol for ad hoc wireless networks that utilizes multiple channels dynamically to improve performance. The IEEE 802.11 standard allows for the use of multiple channels available at the physical layer, but its MAC protocol is designed only for a

A centralized key management scheme for hierarchical access control

by Qiong Zhang, Yuke Wang, Jason P. Jue - In IEEE Global Telecommunications Conference (Globecom’04 , 2004
"... In group communication, users often have different access rights to multiple data streams. Based on the access relation of users and data streams, users can form partially ordered relations, and data streams can form partially ordered relations. In this paper, we propose a key management scheme for ..."
Abstract - Cited by 18 (0 self) - Add to MetaCart
for hierarchical access control, which considers both partially ordered user relations and partially ordered data stream relations. We also propose an algorithm for constructing a logical key graph, which is suitable even when users and data streams have complex relations. Simulation results show that our scheme

Cryptographic Solution to a Problem of Access Control in a Hierarchical

by Selim G. Akl, Peter D. Taylor - ACM Transaction on Computer System , 1983
"... A scheme based on cryptography is proposed for access control in a system where hierarchy is represented by a partially ordered set (or poset). Straightforward implementation f the scheme requires users highly placed in the hierarchy to store a large number of cryptographic keys. A time-versus-stora ..."
Abstract - Cited by 144 (2 self) - Add to MetaCart
A scheme based on cryptography is proposed for access control in a system where hierarchy is represented by a partially ordered set (or poset). Straightforward implementation f the scheme requires users highly placed in the hierarchy to store a large number of cryptographic keys. A time

Improved proxy re-encryption schemes with applications to secure distributed storage

by Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger - IN NDSS , 2005
"... In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. We predict that fast and secure re-encryption will become increasingly popu ..."
Abstract - Cited by 203 (15 self) - Add to MetaCart
popular as a method for managing encrypted file systems. Although efficiently computable, the wide-spread adoption of BBS re-encryption has been hindered by considerable security risks. Following recent work of Ivan and Dodis, we present new re-encryption schemes that realize a stronger notion of security

A Diffie-Hellman based Key Management Scheme for Hierarchical Access Control

by Anna Zych, Jeroen Doumen, Pieter Hartel, Willem Jonker
"... All organizations share data in a carefully managed fashion by using access control mechanisms. We focus on enforcing access control by encrypting the data and managing the encryption keys. We make the realistic assumption that the structure of any organization is a hierarchy of security classes. D ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
All organizations share data in a carefully managed fashion by using access control mechanisms. We focus on enforcing access control by encrypting the data and managing the encryption keys. We make the realistic assumption that the structure of any organization is a hierarchy of security classes

Layered Video Multicast with Retransmissions (LVMR): Evaluation of Hierarchical Rate Control

by Xue Li, Sanjoy Paul, Mostafa Ammar , 1997
"... Layered Video Multicast with Retransmissions (LVMR) is a system for distributing video using layered coding over the Internet. The two key contributions of the system are: (1) improving the quality of reception within each layer by retransmitting lost packets given an upper bound on recovery time ..."
Abstract - Cited by 177 (12 self) - Add to MetaCart
time and applying an adaptive playback point scheme to help achieve more successful retransmission, and (2) adapting to network congestion and heterogeneity using hierarchical rate control mechanism. This paper concentrates on the rate control aspects of LVMR. In contrast to the existing sender

An ID-based Hierarchical Access Control Scheme with Constant Size Public Parameter

by Rang Zhou , Chunxiang Xu , Wanpeng Li , Jining Zhao
"... Abstract Many ways are proposed to reduce the secret storage space of access control in hierarchy, but no one optimizes the public parameters which are only modified by CA. Length of each public parameter is one important factor for the size and utilization of storage space. The frequent changes on ..."
Abstract - Add to MetaCart
on the maximum length of public parameter will be a weakness for stability, in dynamic key management. Number and length of changed public parameter are considered for the interaction between CA and trusted public platform in dynamic management. The paper proposes an improved scheme to optimize storage space

On key assignment for hierarchical access control

by Jason Crampton, Keith Martin, Peter Wild, Royal Holloway - In IEEE Computer Security Foundations Workshop (CSFW’06 , 2006
"... A key assignment scheme is a cryptographic technique for implementing an information flow policy, sometimes known as hierarchical access control. All the research to date on key assignment schemes has focused on particular encryption techniques rather than an analysis of what features are required o ..."
Abstract - Cited by 37 (10 self) - Add to MetaCart
A key assignment scheme is a cryptographic technique for implementing an information flow policy, sometimes known as hierarchical access control. All the research to date on key assignment schemes has focused on particular encryption techniques rather than an analysis of what features are required
Next 10 →
Results 1 - 10 of 1,975
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University