Sciweavers

485 search results - page 35 / 97
» Heterogeneity-Aware Distributed Access Structure
Sort
View
GLOBECOM
2010
IEEE
13 years 8 months ago
Trusted Storage over Untrusted Networks
We consider distributed storage over two untrusted networks, whereby coding is used as a means to achieve a prescribed level of confidentiality. The key idea is to exploit the alge...
Paulo F. Oliveira, Luísa Lima, Tiago T. V. ...
PODC
2004
ACM
14 years 3 months ago
Bringing practical lock-free synchronization to 64-bit applications
Many lock-free data structures in the literature exploit techniques that are possible only because state-of-the-art 64-bit processors are still running 32-bit operating systems an...
Simon Doherty, Maurice Herlihy, Victor Luchangco, ...
ICDCS
2005
IEEE
14 years 3 months ago
DISC: Dynamic Interleaved Segment Caching for Interactive Streaming
Streaming media objects have become widely used on the Internet, and the demand of interactive requests to these objects has increased dramatically. Typical interactive requests i...
Lei Guo, Songqing Chen, Zhen Xiao, Xiaodong Zhang
GI
2004
Springer
14 years 3 months ago
Tuplespace-Based Collaboration for Bluetooth-Enabled Devices in Smart Environments
: Smart environments are often populated by resource-restricted devices that need to cooperate with each other in order to access remote sensors and benefit from other devices’ ...
Frank Siegemund, Pascal Keller
IJPP
2010
156views more  IJPP 2010»
13 years 7 months ago
ForestGOMP: An Efficient OpenMP Environment for NUMA Architectures
Exploiting the full computational power of current hierarchical multiprocessor machines requires a very careful distribution of threads and data among the underlying non-uniform ar...
François Broquedis, Nathalie Furmento, Bric...