نتایج جستجو برای: memory protocol
تعداد نتایج: 500200 فیلتر نتایج به سال:
A crucial issue, that mostly affects the performance of actively secure computation of RAM programs, is the task of reading/writing from/to memory in a private and authenticated manner. Previous works in the active security and multiparty settings are based purely on the SPDZ (reactive) protocol, hence, memory accesses are treated just like any input to the computation. However, a garbled-circu...
Abstract Background and aim: Globally, stroke ranks as the second most common cause of death and places a substantial financial burden on society. The purpose of this study was to examine the impact of neuropsychological rehabilitation on memory and mood regulation among stroke patients residing in Yasuj city. Methods: A semi-experimental research design was employed in this study, which inclu...
We believe that designing a new network protocol stack whether for conventional communications or for perceptual time multimedia applications should be based on new concepts that suit the specific goals. Our aim is to build a platform for multimedia applications. It has hence to consider suitable concepts that will hopefully lead to an optimal design. The Multimedia platform (PRISM) design had ...
Message-based process architectures are widely regarded as an effective method for structuring parallel protocol processing on shared memory multi-processor platforms. A message-based process architectures is formed by binding one or more processing elements with the data messages and control messages received from applications and network interfaces. In this architecture, parallelism is achiev...
This paper addresses protocol susceptibility to denial-of-service attacks. We analyze protocol fragments using Meadows’s cost-based framework [9] to identify sequences of actions that render servers disabled, either due to memory or CPU exhaustion. In particular, we show that the JFK protocol [1] is DoS-resistant when bogus messages are handled in an appropriate way. We also discuss the relatio...
We consider two-party quantum protocols starting with a transmission of some random BB84 qubits followed by classical messages. We show a general “compiler” improving the security of such protocols: if the original protocol is secure against an “almost honest” adversary, then the compiled protocol is secure against an arbitrary computationally bounded (quantum) adversary. The compilation preser...
Verifying whether a building block conforms to a specific interface protocol is one of the important steps in a platform-based system-on-a-chip design methodology. There are limitations for most of the existing methods for interface protocol compliance verification. Simulation-based methods have the false positive problem while formal property checking methods may suffer from memory explosion a...
We consider the propagation of nonlinear sound waves in a perfect fluid at rest. By employing Riemann wave equation acoustics one spatial dimension, it is shown that carrying constant density perturbation their tails produce an acoustic analogue gravitational memory. For memory, which general nonlinear, nonlinearity effective spacetime dynamics not due to Einstein equations, but equations. conc...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید