Sciweavers

929 search results - page 19 / 186
» On Computation and Communication with Small Bias
Sort
View
CRYPTO
1999
Springer
103views Cryptology» more  CRYPTO 1999»
14 years 27 days ago
Information Theoretically Secure Communication in the Limited Storage Space Model
Abstract. We provide a simple secret-key two-party secure communication scheme, which is provably information-theoretically secure in the limited-storage-space model. The limited-s...
Yonatan Aumann, Michael O. Rabin
PODC
2010
ACM
14 years 15 days ago
Brief announcement: exponential speed-up of local algorithms using non-local communication
We demonstrate how to leverage a system’s capability for allto-all communication to achieve an exponential speed-up of local algorithms despite bandwidth and memory restrictions...
Christoph Lenzen, Roger Wattenhofer
ICA3PP
2010
Springer
13 years 8 months ago
Checkpointing and Migration of Communication Channels in Heterogeneous Grid Environments
Abstract. A grid checkpointing service providing migration and transparent fault tolerance is important for distributed and parallel applications executed in heterogeneous grids. I...
John Mehnert-Spahn, Michael Schoettner
AINA
2007
IEEE
14 years 3 months ago
Pervasive Computing with Frugal Objects
— This paper presents a computing model for resource-limited mobile devices that might be ubiquitously deployed in private and business environments. The model integrates a stron...
Benoît Garbinato, Rachid Guerraoui, Jarle Hu...
CORR
2000
Springer
91views Education» more  CORR 2000»
13 years 8 months ago
Algorithmic Theories of Everything
The probability distribution P from which the history of our universe is sampled represents a theory of everything or TOE. We assume P is formally describable. Since most (uncount...
Jürgen Schmidhuber