Sciweavers

2421 search results - page 152 / 485
» Message from the Co-Chairs
Sort
View
SIGMETRICS
2012
ACM
271views Hardware» more  SIGMETRICS 2012»
11 years 11 months ago
An empirical comparison of Java remote communication primitives for intra-node data transmission
This paper presents a benchmarking suite that measures the performance of using sockets and eXtensible Markup Language remote procedure calls (XML-RPC) to exchange intra-node mess...
Philip F. Burdette, William F. Jones, Brian C. Blo...
TCC
2009
Springer
153views Cryptology» more  TCC 2009»
14 years 9 months ago
On the (Im)Possibility of Key Dependent Encryption
We study the possibility of constructing encryption schemes secure under messages that are chosen depending on the key k of the encryption scheme itself. We give the following sep...
Iftach Haitner, Thomas Holenstein
SIGIR
2009
ACM
14 years 3 months ago
It pays to be picky: an evaluation of thread retrieval in online forums
Online forums host a rich information exchange, often with contributions from many subject matter experts. In this work we evaluate algorithms for thread retrieval in a large and ...
Jonathan L. Elsas, Jaime G. Carbonell
SECON
2007
IEEE
14 years 3 months ago
Multi-user Broadcast Authentication in Wireless Sensor Networks
— Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as it allows the mobile users of WSNs to broadcast messages to multiple sensor nodes...
Kui Ren, Wenjing Lou, Yanchao Zhang
PARCO
1997
13 years 10 months ago
Scheduling Block-Cyclic Array Redistribution
This article is devoted to the run-time redistribution of arrays that are distributed in a blockcyclic fashion over a multidimensional processor grid. While previous studies have ...
Frederic Desprez, Jack Dongarra, Antoine Petitet, ...