Now showing items 184-186 of 3794

    • Adaptively Secure Multi-party Computation 

      Canetti, Ran; Feige, Uri; Goldreich, Oded; Naor, Moni (1996-02)
      A fundamental problem in designing secure multi-party protocols is how to deal with adaptive adversaries (i.e., adversaries that may choose the corrupted parties during the course of the computation), in a setting where ...
    • A Theory of Clock Synchronization 

      Patt, Boaz (1994-10)
      We consider the problem of clock synchronization in a system with uncertain message delays and clocks with bounded drift. To analyze this classical problem, we introduce the concept of synchronization graphs, and show that ...
    • Admission Control and Routing: Theory and Practice 

      Gawlick, Rainer (1995-06)
      Emerging high speed Broadband Integrated Services Digital Networks (B-ISDN) will carry traffic for services such as video-on-demand and video teleconferencing, which require resource reservation along the path on which the ...