Optimization of swift protocols
نویسندگان
چکیده
منابع مشابه
Energy optimization based on routing protocols in wireless sensor network
Considering the great significant role that routing protocols play in transfer rate and choosing the optimum path for exchange of data packages, and further in the amount of consumed energy in the routing protocol, the present study has focused on developing an efficient compound energy algorithm based on cluster structure which is called active node with cluster structure. The purpose of this ...
متن کاملOptimization of Quantum Repeater Protocols
We consider a dynamic programming approach for the systematic optimization of standard quantum repeater protocols. For the specific optimization problem we choose to fix the distance and fidelity of a desired entangled pair (a fundamental resource for long-distance quantum communication) and attempt to minimize the time required to create such a pair. Taking advantage of the natural self-simila...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولOptimization of Parameters in 16-slice CT-scan Protocols for Reduction of the Absorbed Dose
Introduction In computed tomography (CT) technology, an optimal radiation dose can be achieved via changing radiation parameters such as mA, pitch factor, rotation time and tube voltage (kVp) for diagnostic images. Materials and Methods In this study, the brain, abdomen, and thorax scaning was performed using Toshiba 16-slice scannerand standard AAPM and CTDI phantoms. AAPM phantom was used for...
متن کاملMachine-Level Software Optimization of Cryptographic Protocols
This work explores two methods for practical cryptography on mobile devices. The first method is a quantum-resistant key-exchange protocol proposed by Jao et al.. As the use of mobile devices increases, the deployment of practical cryptographic protocols designed for use on these devices is of increasing importance. Furthermore, we are faced with the possible development of a large-scale quantu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the ACM on Programming Languages
سال: 2019
ISSN: 2475-1421
DOI: 10.1145/3360590