Sciweavers

1249 search results - page 222 / 250
» Limitations of the Even-Mansour Construction
Sort
View
INFOCOM
2008
IEEE
14 years 4 months ago
Peacock Hashing: Deterministic and Updatable Hashing for High Performance Networking
—Hash tables are extensively used in networking to implement data-structures that associate a set of keys to a set of values, as they provide O(1), query, insert and delete opera...
Sailesh Kumar, Jonathan S. Turner, Patrick Crowley
INFOCOM
2008
IEEE
14 years 4 months ago
On the Levy-Walk Nature of Human Mobility
—We report that human walks performed in outdoor settings of tens of kilometers resemble a truncated form of Levy walks commonly observed in animals such as monkeys, birds and ja...
Injong Rhee, Minsu Shin, Seongik Hong, Kyunghan Le...
IPPS
2008
IEEE
14 years 4 months ago
Data throttling for data-intensive workflows
— Existing workflow systems attempt to achieve high performance by intelligently scheduling tasks on resources, sometimes even attempting to move the largest data files on the hi...
Sang-Min Park, Marty Humphrey
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
14 years 4 months ago
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance
Compliance storage is an increasingly important area for businesses faced with a myriad of new document retention regulations. Today, businesses have turned to Write-One Read Many ...
Nikita Borisov, Soumyadeb Mitra
ISCC
2007
IEEE
136views Communications» more  ISCC 2007»
14 years 4 months ago
Analysis of the IPv4 Address Space Delegation Structure
The Internet has grown tremendously in terms of the number of users who rely on it and the number of organizations that are connected to it. Characterizing how this growth affects...
Anusha Sriraman, Kevin R. B. Butler, Patrick Drew ...