Sciweavers

7992 search results - page 1565 / 1599
» Communication Abstractions for Distributed Systems
Sort
View
JUCS
2008
156views more  JUCS 2008»
13 years 8 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
JSAC
2006
155views more  JSAC 2006»
13 years 8 months ago
Cross-Layer Optimized Video Streaming Over Wireless Multihop Mesh Networks
Abstract--The proliferation of wireless multihop communication infrastructures in office or residential environments depends on their ability to support a variety of emerging appli...
Yiannis Andreopoulos, Nicholas Mastronarde, Mihael...
FGCS
2007
142views more  FGCS 2007»
13 years 8 months ago
Fault tolerant high performance Information Services for dynamic collections of Grid and Web services
Abstract. E-Science Semantic Grids can often be thought of as dynamic collection of semantic subgrids where each subgrid is a collection of modest number of services that assembled...
Mehmet S. Aktas, Geoffrey Fox, Marlon E. Pierce
SOFTWARE
1998
13 years 8 months ago
Interrupts: Just a Minute Never Is
development is a highly abstract process that requires intense concentration. The authors show that interrupting this process can significantly reduce a developer’s efficiency an...
Rini van Solingen, Egon Berghout, Frank van Latum
JFP
2010
107views more  JFP 2010»
13 years 7 months ago
Lightweight checkpointing for concurrent ML
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Suresh Jagannathan
« Prev « First page 1565 / 1599 Last » Next »