Sciweavers

1717 search results - page 190 / 344
» Data Integrity in a Distributed Storage System
Sort
View
SP
2007
IEEE
183views Security Privacy» more  SP 2007»
14 years 4 months ago
Ciphertext-Policy Attribute-Based Encryption
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such...
John Bethencourt, Amit Sahai, Brent Waters
CCGRID
2006
IEEE
14 years 4 months ago
VODCA: View-Oriented, Distributed, Cluster-Based Approach to Parallel Computing
This paper presents a high-performance Distributed Shared Memory system called VODCA, which supports a novel View-Oriented Parallel Programming on cluster computers. One advantage...
Zhiyi Huang, Wenguang Chen, Martin K. Purvis, Weim...
ICISS
2009
Springer
14 years 4 months ago
Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles
Many peer-assisted content-distribution systems reward a peer based on the amount of data that this peer serves to others. However, validating that a peer did so is, to our knowled...
Michael K. Reiter, Vyas Sekar, Chad Spensky, Zheng...
SIGCOMM
2010
ACM
13 years 10 months ago
Symbiotic routing in future data centers
Building distributed applications for data centers is hard. CamCube explores whether replacing the traditional switchbased network with a directly connected topology makes it easi...
Hussam Abu-Libdeh, Paolo Costa, Antony I. T. Rowst...
ISVC
2005
Springer
14 years 3 months ago
Tool for Storm Analysis Using Multiple Data Sets
This note describes a web-based tool for storm analysis using multiple data sets developed for use in research of thunderstorms and forecasting applications. The tool was developed...
Robert M. Rabin, Tom Whittaker