Sciweavers

929 search results - page 181 / 186
» On Computation and Communication with Small Bias
Sort
View
ESORICS
2008
Springer
13 years 9 months ago
Remote Integrity Check with Dishonest Storage Server
We are interested in this problem: a verifier, with a small and reliable storage, wants to periodically check whether a remote server is keeping a large file x. A dishonest server,...
Ee-Chien Chang, Jia Xu
IMC
2007
ACM
13 years 9 months ago
Network loss inference with second order statistics of end-to-end flows
We address the problem of calculating link loss rates from end-to-end measurements. Contrary to existing works that use only the average end-to-end loss rates or strict temporal c...
Hung Xuan Nguyen, Patrick Thiran
CIDR
2003
164views Algorithms» more  CIDR 2003»
13 years 8 months ago
Capacity Bound-free Web Warehouse
Web cache technologies have been developed as an extension of CPU cache, by modifying LRU (Least Recently Used) algorithms. Actually in web cache systems, we can use disks and ter...
Yahiko Kambayashi, Kai Cheng
CPHYSICS
2010
184views more  CPHYSICS 2010»
13 years 7 months ago
Parallel Newton-Krylov-Schwarz algorithms for the three-dimensional Poisson-Boltzmann equation in numerical simulation of colloi
We investigate fully parallel Newton-Krylov-Schwarz (NKS) algorithms for solving the large sparse nonlinear systems of equations arising from the finite element discretization of ...
Feng-Nan Hwang, Shang-Rong Cai, Yun-Long Shao, Jon...
CORR
2008
Springer
143views Education» more  CORR 2008»
13 years 7 months ago
Maximally Radio-Disjoint Multipath Routing for Wireless Multimedia Sensor Networks
In wireless sensor networks, bandwidth is one of precious resources to multimedia applications. To get more bandwidth, multipath routing is one appropriate solution provided that ...
Moufida Maimour