Sciweavers

456 search results - page 51 / 92
» On Routing in Distributed Hash Tables
Sort
View
DIM
2005
ACM
14 years 29 days ago
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
CF
2008
ACM
14 years 1 months ago
Multi-terabit ip lookup using parallel bidirectional pipelines
To meet growing terabit link rates, highly parallel and scalable architectures are needed for IP lookup engines in next generation routers. This paper proposes an SRAM-based multi...
Weirong Jiang, Viktor K. Prasanna
CVPR
2009
IEEE
14 years 5 months ago
Disambiguating the recognition of 3D objects
We propose novel algorithms for the detection, segmentation, recognition, and pose estimation of threedimensional objects. Our approach initially infers geometric primitives to de...
Gutemberg Guerra-Filho
ANSS
2008
IEEE
14 years 5 months ago
SCAR - Scattering, Concealing and Recovering Data within a DHT
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...
Bryan N. Mills, Taieb Znati
P2P
2010
IEEE
144views Communications» more  P2P 2010»
13 years 9 months ago
Hivory: Range Queries on Hierarchical Voronoi Overlays
Abstract—The problem of defining a support for multidimensional range queries on P2P overlays is currently an active field of research. Several approaches based on the extensio...
Matteo Mordacchini, Laura Ricci, Luca Ferrucci, Mi...