Academic literature on the topic 'Broadcast primitives'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Broadcast primitives.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Broadcast primitives"

1

BERNASCHI, MASSIMO, GIULIO IANNELLO, and SAVERIO CREA. "EXPERIMENTAL RESULTS ABOUT MPI COLLECTIVE COMMUNICATION OPERATIONS." Parallel Processing Letters 15, no. 01n02 (March 2005): 223–36. http://dx.doi.org/10.1142/s0129626405002179.

Full text
Abstract:
Collective communication performance is critical in a number of MPI applications. In this paper we focus on two widely used primitives, broadcast and reduce, and present experimental results obtained on a cluster of PC connected by InfiniBand. We integrated our algorithms in the MPICH library and we used MPICH implementation of broadcast and reduce primitives to compare the performance of our algorithms based on α-trees. Our tests show that the MPICH implementation can be improved.
APA, Harvard, Vancouver, ISO, and other styles
2

Ramakrishna, S., B. Prasad, A. Thenmozhi, S. Samdarshi, K. Velaga, K. Shah, and K. Ravindran. "Design of broadcast programming primitives for distributed systems." Computer Communications 16, no. 9 (September 1993): 557–67. http://dx.doi.org/10.1016/0140-3664(93)90026-o.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Groza, Bogdan, and Pal-Stefan Murvay. "Secure Broadcast with One-Time Signatures in Controller Area Networks." International Journal of Mobile Computing and Multimedia Communications 5, no. 3 (July 2013): 1–18. http://dx.doi.org/10.4018/jmcmc.2013070101.

Full text
Abstract:
Broadcast authentication in Controller Area Networks (CAN) is subject to real time constraints that are hard to satisfy by expensive public key primitives. For this purpose the authors study here the use of one-time signatures which can be built on the most computationally efficient one-way functions. The authors use an enhancement of the classical Merkle signature as well as the more recently proposed HORS signature scheme. Notably, these two proposals offer different trade-offs, and they can be efficiently paired with time synchronization to reduce the overhead caused by the re-initialization of the public keys, which would otherwise require expensive authentication trees. The authors do outline clear bounds on the performance of such a solution and provide experimental results on development boards equipped with Freescale S12X, a commonly used automotive grade micro-controller. The authors also benefit from the acceleration offered by the XGATE co-processor available on S12X derivatives which significantly increases the computational performances.
APA, Harvard, Vancouver, ISO, and other styles
4

Ellen, Faith, Barun Gorain, Avery Miller, and Andrzej Pelc. "Constant-Length Labeling Schemes for Deterministic Radio Broadcast." ACM Transactions on Parallel Computing 8, no. 3 (September 30, 2021): 1–17. http://dx.doi.org/10.1145/3470633.

Full text
Abstract:
Broadcast is one of the fundamental network communication primitives. One node of a network, called the s ource, has a message that has to be learned by all other nodes. We consider broadcast in radio networks, modeled as simple undirected connected graphs with a distinguished source. Nodes communicate in synchronous rounds. In each round, a node can either transmit a message to all its neighbours, or stay silent and listen. At the receiving end, a node v hears a message from a neighbour w in a given round if v listens in this round and if w is its only neighbour that transmits in this round. If more than one neighbour of a node v transmits in a given round, we say that a c ollision occurs at v . We do not assume collision detection: in case of a collision, node v does not hear anything (except the background noise that it also hears when no neighbour transmits). We are interested in the feasibility of deterministic broadcast in radio networks. If nodes of the network do not have any labels, deterministic broadcast is impossible even in the four-cycle. On the other hand, if all nodes have distinct labels, then broadcast can be carried out, e.g., in a round-robin fashion, and hence O (log n )-bit labels are sufficient for this task in n -node networks. In fact, O (log Δ)-bit labels, where Δ is the maximum degree, are enough to broadcast successfully. Hence, it is natural to ask if very short labels are sufficient for broadcast. Our main result is a positive answer to this question. We show that every radio network can be labeled using 2 bits in such a way that broadcast can be accomplished by some universal deterministic algorithm that does not know the network topology nor any bound on its size. Moreover, at the expense of an extra bit in the labels, we can get the following additional strong property of our algorithm: there exists a common round in which all nodes know that broadcast has been completed. Finally, we show that 3-bit labels are also sufficient to solve both versions of broadcast in the case where it is not known a priori which node is the source.
APA, Harvard, Vancouver, ISO, and other styles
5

Yadav, Snehlata, and Namita Tiwari. "An Efficient and Secure Data Sharing Method Using Asymmetric Pairing with Shorter Ciphertext to Enable Rapid Learning in Healthcare." Computational Intelligence and Neuroscience 2022 (April 20, 2022): 1–13. http://dx.doi.org/10.1155/2022/4788031.

Full text
Abstract:
The recent advent of cloud computing provides a flexible way to effectively share data among multiple users. Cloud computing and cryptographic primitives are changing the way of healthcare unprecedentedly by providing real-time data sharing cost-effectively. Sharing various data items from different users to multiple sets of legitimate subscribers in the cloud environment is a challenging issue. The online electronic healthcare system requires multiple data items to be shared by different users for various purposes. In the present scenario, COVID-19 data is sensitive and must be encrypted to ensure data privacy. Secure sharing of such information is crucial. The standard broadcast encryption system is inefficient for this purpose. Multichannel broadcast encryption is a mechanism that enables secure sharing of different messages to different set of users efficiently. We propose an efficient and secure data sharing method with shorter ciphertext in public key setting using asymmetric (Type-III) pairings. The Type-III setting is the most efficient form among all pairing types regarding operations required and security. The semantic security of this method is proven under decisional BDHE complexity assumption without random oracle model.
APA, Harvard, Vancouver, ISO, and other styles
6

Szilágyi, Péter. "Iris: A decentralized approach to backend messaging middlewares." Computer Science and Information Systems 11, no. 2 (2014): 549–67. http://dx.doi.org/10.2298/csis130823024s.

Full text
Abstract:
In this work we introduce the design and internal workings of the Iris decentralized messaging framework. Iris takes a midway approach between the two prevalent messaging middleware models: the centralized one represented by the AMQP family and the socket queuing one represented by ZeroMQ; by turning towards peer-to-peer overlays as the internal transport for message distribution and delivery. A novel concept is introduced, whereby a distributed service is composed not of individual application instances, but rather clusters of instances responsible for the same sub-service. Supporting this new model, a collection of higher level messaging patterns have been identified and successfully implemented: broadcast, request/reply, publish/subscribe and tunnel. This conceptual model and supporting primitives allow a much simpler way to specify, design and implement distributed, cloud based services. Furthermore, the proposed system achieves a significant switching speed, which - given its decentralized nature - can be scaled better than existing messaging frameworks, whilst incurring zero configuration costs.
APA, Harvard, Vancouver, ISO, and other styles
7

Lee, Jiwon, Seunghwa Lee, Jihye Kim, and Hyunok Oh. "Combinatorial Subset Difference—IoT-Friendly Subset Representation and Broadcast Encryption." Sensors 20, no. 11 (June 2, 2020): 3140. http://dx.doi.org/10.3390/s20113140.

Full text
Abstract:
In the Internet of Things (IoT) systems, it is often required to deliver a secure message to a group of devices. The public key broadcast encryption is an efficient primitive to handle IoT broadcasts, by allowing a user (or a device) to broadcast encrypted messages to a group of legitimate devices. This paper proposes an IoT-friendly subset representation called Combinatorial Subset Difference (CSD), which generalizes the existing subset difference (SD) method by allowing wildcards (*) in any position of the bitstring. Based on the CSD representation, we first propose an algorithm to construct the CSD subset, and a CSD-based public key broadcast encryption scheme. By providing the most general subset representation, the proposed CSD-based construction achieves a minimal header size among the existing broadcast encryption. The experimental result shows that our CSD saves the header size by 17% on average and more than 1000 times when assuming a specific IoT example of IP address with 20 wildcards and 2 20 total users, compared to the SD-based broadcast encryption. We prove the semantic security of CSD-based broadcast encryption under the standard l-BDHE assumption, and extend the construction to a chosen-ciphertext-attack (CCA)-secure version.
APA, Harvard, Vancouver, ISO, and other styles
8

Morris, Glenn K., Paul A. DeLuca, Matthew Norton, and Andrew C. Mason. "Calling-song function in male haglids (Orthoptera: Haglidae, Cyphoderris)." Canadian Journal of Zoology 80, no. 2 (February 1, 2002): 271–85. http://dx.doi.org/10.1139/z02-003.

Full text
Abstract:
We studied the response of males to the singing of nearby male conspecifics in two species of the orthopteran genus Cyphoderris, primitive relatives of crickets and katydids. Lone male Cyphoderris buckelli stridulating in a large cage made a phonotactic approach to a nearby speaker broadcasting conspecific calling song. But in field experiments no phonotaxis to song broadcasts occurred; rather, a significant number of male C. buckelli increased their chirp duty cycle and pulse rate. There was no change in their carrier frequency. Calling male Cyphoderris monstrosa were exposed in the field to (i) playback of a synthetic calling song at a typical conspecific pulse rate, (ii) relayed broadcast of their own call, and (iii) low-frequency audio noise. Call duty cycle decreased significantly in response to the noise, while the pooled song models fell just short of significance. Singing C. buckelli were marked individually and their perches flagged over successive nights. We observed low site fidelity and extensive male displacement. Such behaviour is inconsistent with defense of topographically fixed singing territories and concurs with the absence of fighting in this species. Chirp duty cycle was increased significantly in C. buckelli in response to the singing of nearby conspecifics, but unlike in C. monstrosa, this change in duty cycle plays no role in overt aggression, though it may maintain a male's relative attractiveness to females.
APA, Harvard, Vancouver, ISO, and other styles
9

Morris, Glenn. "Acoustic Behavior in Cyphoderris strepitans." UW National Parks Service Research Station Annual Reports 9 (January 1, 1985): 85–91. http://dx.doi.org/10.13001/uwnpsrc.1985.2497.

Full text
Abstract:
Cyphoderris strepitans, is a primitive orthopteran which survives only in the mountains of Wyoming and Colorado (Morris and Gwynne 1978). The males rub their forewings together to produce a calling song. This stridulation is presumed to function, as in other acoustic Orthoptera, in attracting conspecific fema1es for mating and in maintaining a broadcast territory around each singer.
APA, Harvard, Vancouver, ISO, and other styles
10

Huang, Haiping, Qinglong Huang, Fu Xiao, Wenming Wang, Qi Li, and Ting Dai. "An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains." Security and Communication Networks 2020 (September 1, 2020): 1–17. http://dx.doi.org/10.1155/2020/8897282.

Full text
Abstract:
Broadcast authentication is a fundamental security primitive in wireless sensor networks (WSNs), which is a critical sensing component of IoT. Although symmetric-key-based μTESLA protocol has been proposed, some concerns about the difficulty of predicting the network lifecycle in advance and the security problems caused by an overlong long hash chain still remain. This paper presents a scalable broadcast authentication scheme named DH-μTESLA, which is an extension and improvement of μTESLA and Multilevel μTESLA, to achieve several vital properties, such as infinite lifecycle of hash chains, security authentication, scalability, and strong tolerance of message loss. The proposal consists of the t,n-threshold-based self-reinitializable hash chain scheme (SRHC-TD) and the d-left-counting-Bloom-filter-based authentication scheme (AdlCBF). In comparison to other broadcast authentication protocols, our proposal achieves more security properties such as fresh node’s participation and DoS resistance. Furthermore, the reinitializable hash chain constructed in SRHC-TD is proved to be secure and has less computation and communication overhead compared with typical solutions, and efficient storage is realized based on AdlCBF, which can also defend against DoS attacks.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Broadcast primitives"

1

Auvolat, Alex. "Probabilistic methods for collaboration systems in large-scale trustless networks." Thesis, Rennes 1, 2021. http://www.theses.fr/2021REN1S125.

Full text
Abstract:
Internet est un outil formidable pour l'éducation, la communication et la collaboration, mais ses usages majoritaires sont actuellement sous monopole de grandes multinationales (GAFAM), ce qui a des conséquences sur le respect des droits humains et des libertés individuelles. Cette thèse propose des outils pour le développement d'applications décentralisées : des applications sur Internet qui fournissent des fonctionnalités similaires aux plateformes des GAFAM, mais de manière décentralisée, afin de rendre le pouvoir aux utilisateur pour décider démocratiquement de leur fonctionnement et de leurs usages. Nous nous concentrons sur les algorithmes épidémiques qui sont particulièrement adaptés dans le cadre de réseaux ouverts à large échelle. Nous proposons des contributions sur la diffusion causale de messages tolérante aux nœuds Byzantins, la diffusion causale épidémique à l'aide d'un stockage d'événements synchronisé par anti-entropie, l'échantillonnage aléatoire de pairs résistants aux attaques Byzantines et aux attaques Sybil, ainsi qu'un nouvel algorithme épidémique de diffusion totalement ordonnée qui tolère les nœuds malicieux et fournit un débit de messages élevé
The Internet is a formidable tool for education, communication and collaboration, however it is currently being monopolized by large corporations (GAFAM), which has consequences for many social issues such as respect of human rights and individual freedoms. This thesis focuses on ways to build decentralized applications: Internet applications that provide levels of functionality similar to those provided by the GAFAM, but that function in a decentralized manner, empowering the users to democratically decide of their functioning and their uses. We focus on epidemic algorithms, which are particularly suited to the context of very large open networks. We make contributions on causal broadcast in presence of Byzantine nodes, epidemic causal broadcast using an event store synchronized with an anti-entropy algorithm, random peer sampling in presence of Byzantine nodes and Sybil attacks, as well as a new epidemic total order broadcast which is tolerant to malicious nodes and provides high throughput message delivery
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Broadcast primitives"

1

Caldwell, Lesley, and Helen Taylor Robinson, eds. The Collected Works of D. W. Winnicott. Oxford University Press, 2016. http://dx.doi.org/10.1093/med:psych/9780190271343.001.0001.

Full text
Abstract:
Volume 2, 1939–45, covers the years of World War II. It contains an introduction by the late senior child psychotherapist, Christopher Reeves. The volume includes letters to colleagues, including one to the British Medical Journal with Emanuel Miller and John Bowlby regarding the war and children; a report on war work; Winnicott’s first article on aggression; articles on delinquency and corporal punishment; his contribution to the Controversial Discussions of the British Psychoanalytical Society; texts of his early BBC broadcasts; and the very significant paper, ‘Primitive Emotional Development’, a continually relevant statement of his own evolving position in regard to psychoanalytic theory and practice.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Broadcast primitives"

1

Winnicott, Donald W. "The Development of a Child’s Sense of Right and Wrong." In The Collected Works of D. W. Winnicott, 295–98. Oxford University Press, 2016. http://dx.doi.org/10.1093/med:psych/9780190271381.003.0050.

Full text
Abstract:
In this BBC radio broadcast, Winnicott argues that a child’s sense of right and wrong develops over time if the appropriate environmental conditions are there. He speaks of the baby and early infancy stages of childhood and asks that primitive and natural processes (such as biting greedily) be seen as both real and fantasized experiences. The parents can develop this into a child’s innate goodness and badness. If a child’s guilt at hating alongside loving is recognized and accepted by parents, the child can internalize these conflicts into a more mature sense of right and wrong.
APA, Harvard, Vancouver, ISO, and other styles
2

Hewett, Richard. "The genesis of location realism." In The Changing Spaces of Television Acting. Manchester University Press, 2017. http://dx.doi.org/10.7228/manchester/9781784992989.003.0003.

Full text
Abstract:
Just as studio realism reached its apotheosis in the 1970s, BBC television drama showed signs of moving away from the multi-camera practices of Television Centre and out onto location. While technologically primitive compared to the cameras used today, the early employment of Outside Broadcast videotape equipment for drama (as opposed to live sporting events) saw a move towards a less projected performance style, linked in turn to the gradual introduction in English drama schools of Constantin Stanislavski, whose influence in the UK had been signified a decade earlier by the opening of East 15 and the Drama Centre London. While training for television at drama academies remained minimal, this period saw the beginnings of the birth of location realism, whose emergence in Survivors was praised by contemporary viewers.
APA, Harvard, Vancouver, ISO, and other styles
3

Reeves, Christopher. "Introduction to Volume 2." In The Collected Works of D. W. Winnicott, 3–22. Oxford University Press, 2016. http://dx.doi.org/10.1093/med:psych/9780190271343.003.0063.

Full text
Abstract:
In this essay Reeves looks at Winnicott’s development as a paediatrician and an analyst before and during World War Two. He discusses two of Winnicott’s groundbreaking theoretical papers on psychoanalysis written at this time (Primitive Emotional Development and The Observation of Infants in a Set Situation), his fame as a BBC broadcaster speaking to parents about the effects of evacuation on them and their children, his experience of the scientific controversies within the British Psychoanalytical Society at this time, his work in the Oxfordshire Q Camps for evacuated young people, and the beginnings of his distinctive contribution to metapyschological theories in psychoanalysis.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Broadcast primitives"

1

Stanoi, I., D. Agrawal, and A. El Abbadi. "Using broadcast primitives in replicated databases (abstract)." In the sixteenth annual ACM symposium. New York, New York, USA: ACM Press, 1997. http://dx.doi.org/10.1145/259380.259487.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Haeupler, Bernhard, and David Wajc. "A Faster Distributed Radio Broadcast Primitive." In PODC '16: ACM Symposium on Principles of Distributed Computing. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2933057.2933121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Camata, Jose J., Renato N. Elias, and Alvaro L. G. A. Coutinho. "MPI Broadcast com Compressão de Números de Ponto Flutuante." In Simpósio em Sistemas Computacionais de Alto Desempenho. Sociedade Brasileira de Computação, 2009. http://dx.doi.org/10.5753/wscad.2009.17390.

Full text
Abstract:
Aplicações cientificas desenvolvidas para sistemas paralelos de memória distribuída consomem parte do seu tempo total de execução trocando dados entre processos. Portanto, aprimorar o desempenho das rotinas responsáveis pela comunicação vem ganhando cada vez mais importância. Neste contexto, este trabalho investiga a utilização de um algoritmo de compressão de ponto-flutuante na transmissão de mensagens longas. Este algoritmo foi implementado na primitiva broadcast do MPI e foram efetuadas medições de desempenho para diferentes tipos de mensagens em até 512 núcleos de processamento. Os resultados obtidos demonstram que a compressão pode acelerar significativamente o broadcast padrão do MPI.
APA, Harvard, Vancouver, ISO, and other styles
4

Lotspiech, Jeffrey B. "A Signature-Like Primitive for Broadcast-Encryption-Based Systems." In 2007 4th IEEE Consumer Communications and Networking Conference. IEEE, 2007. http://dx.doi.org/10.1109/ccnc.2007.210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography