6,175 Hits in 3.5 sec

Implementing multiparty interactions on a network computer

R. Corchuelo, D. Ruiz, M. Toro, A. Ruiz
1999 Proceedings 25th EUROMICRO Conference. Informatics: Theory and Practice for the New Millennium  
in order to solve a problem.  ...  Multiparty interactions are the key to describe these problems, and there are several languages that use them for the description of reactive systems.  ...  We use network computers composed of several virtual machines, a term that comes from SR and describes a collection of resources located on a physical machine.  ... 
doi:10.1109/eurmic.1999.794814 dblp:conf/euromicro/CorchueloRTR99 fatcat:ucoben3lazhmxgichgquc2dgqq

Specification of multiparty audio and video interaction based on the Reference Model of Open Distributed Processing

Valérie Gay, Peter Leydekkers, Robert Huis in 't Veld
1995 Computer networks and ISDN systems  
It provides a framework of abstractions based on viewpoints, and it defines five viewpoint languages to model open distributed systems.  ...  We take this concept as a basis for multiparty audio and video flow exchanges, and we provide five ODP viewpoint specifications, each emphasising a particular concern.  ...  This implies that the structuring of applications is independent of computers and networks on which they run.  ... 
doi:10.1016/0169-7552(94)00033-p fatcat:3y7pqdxgjzbqlcphqrolaftjha

Secure Collaborative Supply-Chain Management

Florian Kerschbaum, Axel Schroepfer, Antonio Zilli, Richard Pibernik, Octavian Catrina, Sebastiaan de Hoogh, Berry Schoenmakers, Stelvio Cimato, Ernesto Damiani
2011 Computer  
After implementing a protocol in L1, we evaluate it using a testbed. Because protocol performance depends on the computer system as well as the network characteristics, we simulate two scenarios.  ...  His research focuses on privacy-protecting protocols as applied to electronic voting, electronic payment systems, and secure multiparty computation, and on implementing systems based on such protocols.  ... 
doi:10.1109/mc.2011.224 fatcat:7umw3rvrd5fanaadlfuo7kbxe4

Multiparty Session and Network Resource Control in the Context Casting (C-CAST) Project [chapter]

Augusto Neto, Susana Sargento, Evariste Logota, Josephine Antoniou, Filipe Pinto
2009 Lecture Notes in Computer Science  
In these environments, where groups may be created based on context, multicast takes a new lead to the communications environment.  ...  In this paper, we propose an efficient architecture for context-aware multiparty session and network control which dynamically adapts to contexts' and networks' dynamics and maintains the connectivity  ...  The ONs implement an overlay agent for proxy functions, and can be implemented in strategic nodes, or everywhere (depending on the network operator decisions).  ... 
doi:10.1007/978-3-642-02472-6_11 fatcat:arhdglvvurgm5b3yig2qzcniem

Multiparty Grammars and Related Features for Defining Interactive Systems

Ben Shneiderman
1982 IEEE Transactions on Systems, Man and Cybernetics  
Multiparty grammars may also be used to describe communication among several people (by way of computers or in normal dialogue), network protocols among several machines, or complex interactions involving  ...  For interactive person-computer systems, both the user commands and system responses can be described by the linked BNF grammars.  ...  involving several people and one machine, or network protocol interaction among several machines (without human intervention).  ... 
doi:10.1109/tsmc.1982.4308798 fatcat:lyl3osuonrfwbiwrqmwk2kuo4q

Page 2572 of Mathematical Reviews Vol. , Issue 97D [page]

1997 Mathematical Reviews  
On the basis of this taxonomy, we then present a comprehensive analysis of the computational complexity of the multiparty interaction scheduling problem, the problem of scheduling multiparty interactions  ...  multiparty interaction.  ... 

Multiparty Delegated Quantum Computing

Elham Kashefi, Anna Pappa
2017 Cryptography  
A more feasible solution is the delegation of computation to powerful quantum servers on the network.  ...  In this work, we further develop this idea of computing over encrypted data, to propose a multiparty delegated quantum computing protocol in the measurement-based quantum computing framework.  ...  This renders our protocol ready to implement in nearfuture hybrid quantum-classical networks, since clients with limited quantum abilities will be able to delegate heavy computations to a powerful quantum  ... 
doi:10.3390/cryptography1020012 fatcat:muh6bzdanrghda5n3c22rugvfe

Dynamic quorum policy for maximizing throughput in limited information multiparty MAC

P. Chaporkar, S. Sarkar, R. Shetty
2006 IEEE/ACM Transactions on Networking  
The computations are based only on limited information about current transmissions in the sender's neighborhood.  ...  The computations are based only on limited information about current transmissions in the sender's neighborhood.  ...  Fig. 2 represents the interaction between a MAC layer multiparty session, and the rest of the network.  ... 
doi:10.1109/tnet.2006.880175 fatcat:gkt3mfiplvgblez4u5tnkxurky

The application of TINA in the Mesh project [chapter]

Marten van Sinderen, Luís Ferreira Pires
1998 Lecture Notes in Computer Science  
MESH adopted TINA as a means to facilitate the design and implementation of a flexible platform for developing and providing interactive multimedia services.  ...  This paper reports on the activity in which the TINA specifications have been studied and implementation options for the TINA components have been selected.  ...  Telecommunication applications therefore can assume the availability of a Distributed Processing Environment (DPE), which allows one to develop and deploy a collection of interacting objects that implement  ... 
doi:10.1007/bfb0055306 fatcat:5jqlqrhgjjau3h3jbazvn3ai3a

Multiple user Authority Framework for Data Sharing in OSN'S

Mrunalini PratapShitole, Madhuri Patil
2015 International Journal of Computer Applications  
Here present a logical representation of our control model which performs many analysis tasks on our model.  ...  For that purpose, here formulate an control model to get intrinsic nature of multiparty authorization requirement along with the condition and a conditional mechanisms.  ...  A user can only control one direction of a relationship. Content sharing Social network provide built-in rules enabling users to interact and contribute contents with other members.  ... 
doi:10.5120/20819-3423 fatcat:oigzcclatrcypahcd2e2xaf6uq

Comparative Evaluation of Elliptic Curve Cryptography Based Homomorphic Encryption Schemes for a Novel Secure Multiparty Computation

Sankita J. Patel, Ankit Chouhan, Devesh C. Jinwala
2014 Journal of Information Security  
In this paper, we focus on Elliptic Curve Cryptography based approach for Secure Multiparty Computation (SMC) problem.  ...  In this paper, we empirically analyze various ECC based homomorphic encryption schemes based on performance metrics such as computational cost and communication cost.  ...  Hence, there is a need to protocol a device that performs joint computation on private data without revealing data to other parties. Secure Multiparty Com-putation (SMC) addresses this issue.  ... 
doi:10.4236/jis.2014.51002 fatcat:wvansmtuy5c65bnnkjbow2ptvu

Multiparty Session Actors

Rumyana Neykova, Nobuko Yoshida
2014 Electronic Proceedings in Theoretical Computer Science  
The framework uses Scribble, which is a protocol description language based on multiparty session types.  ...  An actor can implement multiple roles in a similar way as an object can implement multiple interfaces.  ...  Each actor type is represented in the network as an exchange and is realised as a consumer subscribed to a queue based on a pattern matching on the actor id.  ... 
doi:10.4204/eptcs.155.5 fatcat:cww2ii2mjjdlxb5uf6gnx4yjq4

An Order-Based, Distributed Algorithm for Implementing Multiparty Interactions [chapter]

José Antonio Pérez, Rafael Corchuelo, David Ruiz, Miguel Toro
2002 Lecture Notes in Computer Science  
In this paper, we present an algorithm for implementing them that is based on the idea of locking resources in a given order.  ...  Multiparty interactions have been paid much attention in recent years because they provide the user with a useful mechanism for coordinating a number of entities that need to cooperate in order to achieve  ...  In a chapter of [CRT + 99], we presented a previous solution to implement multiparty interactions that also had coordinators, and a central scheduler responsible for selecting amongst conflicting ones.  ... 
doi:10.1007/3-540-46000-4_24 fatcat:nf72b2orzrg2hnq24hs4ab7dt4

e-Learning Technology: Convergence with the Mainstream [chapter]

Colin Harrison
2003 IFIP Advances in Information and Communication Technology  
Computer Science is seeking to develop technologies that will support a new set of Web experiences.  ...  These technologies will provide a generalised model for describing encounters among people and information and are based on open industry standards.  ...  Above the Distributed Computing layer lies convergent middleware that provides support for generic multiparty, network-mediated, adaptive, interactive, rich-media applications.  ... 
doi:10.1007/978-0-387-35663-1_4 fatcat:yhyfpk3cqfcitm67fsa6eg4lqa

A distributed object-oriented framework for dependable multiparty interactions

A. F. Zorzo, R. J. Stroud
1999 SIGPLAN notices  
In this paperwe describe a way of designing and implementing a more general concept: multiparty interactions.  ...  In this paper, we propose a general scheme for constructing dependable multiparty interactions in a distributed objectoriented system, and describe its implementation in Java.  ...  We w ould like to thank our colleagues from the Department of Computing Science at the University of Newcastle, Jie Xu, Alexander Romanovsky and Ian Welch for their contributions to discussions on the  ... 
doi:10.1145/320385.320431 fatcat:ea5btusbvfdlrgwop5vwjj7g6u
« Previous Showing results 1 — 15 out of 6,175 results