Sciweavers

648 search results - page 101 / 130
» Authenticated hash tables
Sort
View
IEEEPACT
2005
IEEE
14 years 1 months ago
Communication Optimizations for Fine-Grained UPC Applications
Global address space languages like UPC exhibit high performance and portability on a broad class of shared and distributed memory parallel architectures. The most scalable applic...
Wei-Yu Chen, Costin Iancu, Katherine A. Yelick
INFOCOM
2005
IEEE
14 years 1 months ago
FISSIONE: a scalable constant degree and low congestion DHT scheme based on Kautz graphs
Abstract— The distributed hash table (DHT) scheme has become the core component of many large-scale peer-to-peer networks. Degree, diameter, and congestion are important measures...
Dongsheng Li, Xicheng Lu, Jie Wu
ISPAN
2005
IEEE
14 years 1 months ago
Overlay networks with class
We define a family of Distributed Hash Table systems whose aim is to combine routing efficiency of the randomized networks — i.e. average path length O(log n/ log log n) vs. t...
Giovanni Chiola, Gennaro Cordasco, Luisa Gargano, ...
P2P
2005
IEEE
152views Communications» more  P2P 2005»
14 years 1 months ago
On Overlay Schemes to Support Point-in-Range Queries for Scalable Grid Resource Discovery
A resource directory is a critical component of a Grid architecture. P2P computing paradigm could address some of the scalability issues that make distributed resource discovery s...
Liping Chen, K. Selçuk Candan, Jun'ichi Tat...
WACV
2005
IEEE
14 years 1 months ago
3D Recognition and Segmentation of Objects in Cluttered Scenes
In this paper we present a novel view point independent range image segmentation and recognition approach. We generate a library of 3D models off-line and represent each model wit...
Ajmal S. Mian, Mohammed Bennamoun, Robyn A. Owens