Sciweavers

2421 search results - page 479 / 485
» Message from the Editor-in-Chief
Sort
View
ASIACRYPT
2010
Springer
13 years 5 months ago
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
We revisit narrow-pipe designs that are in practical use, and their security against preimage attacks. Our results are the best known preimage attacks on Tiger, MD4, and reduced SH...
Jian Guo, San Ling, Christian Rechberger, Huaxiong...
GLOBECOM
2010
IEEE
13 years 5 months ago
Efficient Uplink Bandwidth Utilization in P2P-TV Streaming Systems
Peer-to-Peer streaming systems (or P2P-TV) have been studied in the literature for some time, and they are becoming popular among users as well. P2P-TV systems target the real time...
Alessandra Carta, Marco Mellia, Michela Meo, Stefa...
INFOCOM
2010
IEEE
13 years 5 months ago
Reliable Wireless Broadcasting with Near-Zero Feedback
We examine the problem of minimizing feedbacks in reliable wireless broadcasting, by pairing rateless coding with extreme value theory. Our key observation is that, in a broadcast ...
Weiyao Xiao, Sachin Agarwal, David Starobinski, Ar...
IPPS
2010
IEEE
13 years 5 months ago
Parallelization of DQMC simulation for strongly correlated electron systems
Abstract--Determinant Quantum Monte Carlo (DQMC) simulation has been widely used to reveal macroscopic properties of strong correlated materials. However, parallelization of the DQ...
Che-Rung Lee, I-Hsin Chung, Zhaojun Bai
IPPS
2010
IEEE
13 years 5 months ago
Scalable failure recovery for high-performance data aggregation
Many high-performance tools, applications and infrastructures, such as Paradyn, STAT, TAU, Ganglia, SuperMon, Astrolabe, Borealis, and MRNet, use data aggregation to synthesize lar...
Dorian C. Arnold, Barton P. Miller