Sciweavers

1717 search results - page 190 / 344
» Data Integrity in a Distributed Storage System
Sort
View
134
Voted
SP
2007
IEEE
183views Security Privacy» more  SP 2007»
15 years 8 months ago
Ciphertext-Policy Attribute-Based Encryption
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such...
John Bethencourt, Amit Sahai, Brent Waters
120
Voted
CCGRID
2006
IEEE
15 years 8 months ago
VODCA: View-Oriented, Distributed, Cluster-Based Approach to Parallel Computing
This paper presents a high-performance Distributed Shared Memory system called VODCA, which supports a novel View-Oriented Parallel Programming on cluster computers. One advantage...
Zhiyi Huang, Wenguang Chen, Martin K. Purvis, Weim...
ICISS
2009
Springer
15 years 9 months ago
Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles
Many peer-assisted content-distribution systems reward a peer based on the amount of data that this peer serves to others. However, validating that a peer did so is, to our knowled...
Michael K. Reiter, Vyas Sekar, Chad Spensky, Zheng...
SIGCOMM
2010
ACM
15 years 2 months ago
Symbiotic routing in future data centers
Building distributed applications for data centers is hard. CamCube explores whether replacing the traditional switchbased network with a directly connected topology makes it easi...
Hussam Abu-Libdeh, Paolo Costa, Antony I. T. Rowst...
122
Voted
ISVC
2005
Springer
15 years 8 months ago
Tool for Storm Analysis Using Multiple Data Sets
This note describes a web-based tool for storm analysis using multiple data sets developed for use in research of thunderstorms and forecasting applications. The tool was developed...
Robert M. Rabin, Tom Whittaker