Sciweavers

330 search results - page 12 / 66
» Controlling data disclosure in computational PIR protocols
Sort
View
FGCS
2008
159views more  FGCS 2008»
13 years 7 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
SC
2004
ACM
14 years 1 months ago
Experiences in Design and Implementation of a High Performance Transport Protocol
This paper describes our experiences in the development of the UDP-based Data Transport (UDT) protocol, an application level transport protocol used in distributed data intensive ...
Yunhong Gu, Xinwei Hong, Robert L. Grossman
IPPS
2006
IEEE
14 years 1 months ago
RAPID: an end-system aware protocol for intelligent data transfer over lambda grids
Next-generation e-Science applications will require the ability to transfer information at high data rates between distributed computing centers and data repositories. To support ...
Amitabha Banerjee, Wu-chun Feng, Biswanath Mukherj...
STORAGESS
2006
ACM
14 years 1 months ago
Access control for a replica management database
Distributed computation systems have become an important tool for scientific simulation, and a similarly distributed replica management system may be employed to increase the loc...
Justin M. Wozniak, Paul Brenner, Douglas Thain
SENSYS
2004
ACM
14 years 1 months ago
The dynamic behavior of a data dissemination protocol for network programming at scale
To support network programming, we present Deluge, a reliable data dissemination protocol for propagating large data objects from one or more source nodes to many other nodes over...
Jonathan W. Hui, David E. Culler