نتایج جستجو برای: memory protocol

تعداد نتایج: 500200  

Journal: :IACR Cryptology ePrint Archive 2017
Marcel Keller Avishay Yanai

A crucial issue, that mostly affects the performance of actively secure computation of RAM programs, is the task of reading/writing from/to memory in a private and authenticated manner. Previous works in the active security and multiparty settings are based purely on the SPDZ (reactive) protocol, hence, memory accesses are treated just like any input to the computation. However, a garbled-circu...

ژورنال: ارمغان دانش 2023

Abstract Background and aim: Globally, stroke ranks as the second most common cause of death and places a substantial financial burden on society. The purpose of this study was to examine the impact of neuropsychological rehabilitation on memory and mood regulation among stroke patients residing in Yasuj city. Methods: A semi-experimental research design was employed in this study, which inclu...

2008
Hossam Afifi Celestin Brou Francois Toutain

We believe that designing a new network protocol stack whether for conventional communications or for perceptual time multimedia applications should be based on new concepts that suit the specific goals. Our aim is to build a platform for multimedia applications. It has hence to consider suitable concepts that will hopefully lead to an optimal design. The Multimedia platform (PRISM) design had ...

1995
Douglas C. Schmidt Tatsuya Suda

Message-based process architectures are widely regarded as an effective method for structuring parallel protocol processing on shared memory multi-processor platforms. A message-based process architectures is formed by binding one or more processing elements with the data messages and control messages received from applications and network interfaces. In this architecture, parallelism is achiev...

2002
Vijay Ramachandran

This paper addresses protocol susceptibility to denial-of-service attacks. We analyze protocol fragments using Meadows’s cost-based framework [9] to identify sequences of actions that render servers disabled, either due to memory or CPU exhaustion. In particular, we show that the JFK protocol [1] is DoS-resistant when bogus messages are handled in an appropriate way. We also discuss the relatio...

2009
Ivan Damgård Serge Fehr Carolin Lunemann Louis Salvail Christian Schaffner

We consider two-party quantum protocols starting with a transmission of some random BB84 qubits followed by classical messages. We show a general “compiler” improving the security of such protocols: if the original protocol is secure against an “almost honest” adversary, then the compiled protocol is secure against an arbitrary computationally bounded (quantum) adversary. The compilation preser...

Journal: :J. Inf. Sci. Eng. 2010
Che-Hua Shih Ya-Ching Yang Chia-Chih Yen Juinn-Dar Huang Jing-Yang Jou

Verifying whether a building block conforms to a specific interface protocol is one of the important steps in a platform-based system-on-a-chip design methodology. There are limitations for most of the existing methods for interface protocol compliance verification. Simulation-based methods have the false positive problem while formal property checking methods may suffer from memory explosion a...

Journal: :Physical review 2022

We consider the propagation of nonlinear sound waves in a perfect fluid at rest. By employing Riemann wave equation acoustics one spatial dimension, it is shown that carrying constant density perturbation their tails produce an acoustic analogue gravitational memory. For memory, which general nonlinear, nonlinearity effective spacetime dynamics not due to Einstein equations, but equations. conc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید