Sciweavers

1718 search results - page 3 / 344
» Communicating more than nothing
Sort
View
ICNP
2007
IEEE
14 years 2 months ago
ALARM: Anonymous Location-Aided Routing in Suspicious MANETs
— In many traditional mobile network scenarios, nodes establish communication on the basis of persistent public identities. However, in some hostile and suspicious MANET settings...
Karim M. El Defrawy, Gene Tsudik
ASIACRYPT
2010
Springer
13 years 6 months ago
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
Private Set Intersection (PSI) protocols allow one party ("client") to compute an intersection of its input set with that of another party ("server"), such tha...
Emiliano De Cristofaro, Jihye Kim, Gene Tsudik
PODC
2009
ACM
14 years 8 months ago
Brief announcement: global consistency can be easier than point-to-point communication
Global consistency or Byzantine Agreement (BA) and reliable point-to-point communication are two of the most important and well-studied problems in distributed computing. Informal...
Prasant Gopal, Anuj Gupta, Pranav K. Vasishta, Piy...
HPTS
1993
146views Database» more  HPTS 1993»
14 years 6 hour ago
Parallel Query Processing in Shared Disk Database Systems
System developments and research on parallel query processing have concentrated either on "Shared Everything" or "Shared Nothing" architectures so far. While t...
Erhard Rahm
CHI
2002
ACM
14 years 8 months ago
Trust without touch: jumpstarting long-distance trust with initial social activities
Computer-mediated communication (CMC) is thought to be inadequate when one needs to establish trust. If, however, people meet before using CMC, they trust each other, trust being ...
Jun Zheng, Elizabeth S. Veinott, Nathan Bos, Judit...