Sciweavers

368 search results - page 14 / 74
» Advanced Computing and Communications Research under NSF Sup...
Sort
View
ISCA
1997
IEEE
137views Hardware» more  ISCA 1997»
13 years 11 months ago
VM-Based Shared Memory on Low-Latency, Remote-Memory-Access Networks
Recent technological advances have produced network interfaces that provide users with very low-latency access to the memory of remote machines. We examine the impact of such netw...
Leonidas I. Kontothanassis, Galen C. Hunt, Robert ...
COCO
2007
Springer
85views Algorithms» more  COCO 2007»
14 years 1 months ago
Norms, XOR Lemmas, and Lower Bounds for GF(2) Polynomials and Multiparty Protocols
This paper presents a unified and simple treatment of basic questions concerning two computational models: multiparty communication complexity and GF(2) polynomials. The key is t...
Emanuele Viola, Avi Wigderson
EUROCRYPT
2005
Springer
14 years 28 days ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...
CASCON
1997
91views Education» more  CASCON 1997»
13 years 8 months ago
Keeping virtual information resources up and running
The maintenanceofmaterializedviews in largescale environments composed of numerous heterogeneous information sources ISs, such as the WWW, has importance for the new breed of in...
Amy J. Lee, Anisoara Nica, Elke A. Rundensteiner
SENSYS
2003
ACM
14 years 19 days ago
SIA: secure information aggregation in sensor networks
Sensor networks promise viable solutions to many monitoring problems. However, the practical deployment of sensor networks faces many challenges imposed by real-world demands. Sen...
Bartosz Przydatek, Dawn Xiaodong Song, Adrian Perr...