نتایج جستجو برای: early abort technique
تعداد نتایج: 1270850 فیلتر نتایج به سال:
At Eurocrypt 2005, Waters proposed an efficient identity based encryption (IBE) scheme. One drawback of this scheme is that the size of the public parameter is rather large. Our first contribution is a generalization of Waters scheme. In particular, we show that there is an interesting trade-off between the tightness of the security reduction and smallness of the public parameter size. For a gi...
The high luminosity upgrade of Large Hadron Collider will increase its by an order magnitude increasing with it the density particles on detector. For protecting inner detectors experiments and for monitoring delivered luminosity, a radiation hard beam monitor is being developed. Text describes proposed system’s principles operation design. It details poly-crystalline chemical vapor deposition ...
We introduce cryptographic protocols for securely and efficiently computing the cardinality of set union intersection. Our private set-cardinality (PSC) are designed setting in which a large parties distributed system makes observations, small with more resources higher reliability aggregates observations. PSC allows secure useful statistics gathering privacy-preserving systems. For example, it...
Current industry proposals for Hardware Transactional Memory (HTM) focus on best-effort solutions (BE-HTM) where hardware limits are imposed on transactions. These designs may show a significant performance degradation due to high contention scenarios and different hardware and operating system limitations that abort transactions, e.g. cache overflows, hardware and software exceptions, etc. To ...
This paper presents a fault-tolerant lazy replication protocol that ensures 1-copy serializability at a relatively low cost. Unlike eager replication approaches, our protocol enables local transaction execution and does not lead to any deadlock situation. Compared to previous lazy replication approaches, we significantly reduce the abort rate of transactions and we do not require any reconcilia...
Impossible differential attack is a well-known mean to examine robustness of block ciphers. Using impossible differ- ential cryptanalysis, we analyze security of a family of lightweight block ciphers, named Midori, that are designed considering low energy consumption. Midori state size can be either 64 bits for Midori64 or 128 bits for Midori128; however, both vers...
Abstract Transaction Memory (TM) is a concurrency control abstraction that allows the programmer to specify blocks of code be executed atomically as transactions. However, since transactional can contain just about any operation attention must paid state shared variables at given time. E.g., contrary database transaction, if TM transaction reads stale value it may execute dangerous operations, ...
An individual developed a lifestyle-limiting case of Panic Disorder that threatened to interfere with her raison d'etre: To participate in the exclusive lifestyle of her community. The panic episodes started to cripple her social calendar and as the "season" came into full swing her coveted role of chairwoman of various philanthropic functions came into peril. A variant of awake-alert hypnosis ...
Total (σ T) and reaction (σ R) cross sections are derived self consistently from the attenuation cross sections measured in transmission experiments at the AGS for K + on 6 Li, C, Si and Ca in the momentum range of 500-700 MeV/c by using a V opt = t ef f (ρ)ρ optical potential. Self consistency requires, for the KN in-medium t matrix, that Im t ef f (ρ) increases linearly with the average nucle...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید