Sciweavers

7629 search results - page 1489 / 1526
» On the Performance of a Survivability Architecture for Netwo...
Sort
View
ICSOC
2004
Springer
14 years 1 months ago
Assured service quality by improved fault management
The paradigm shift from device-oriented to service-oriented management has also implications to the area of event correlation. Today’s event correlation mainly addresses the cor...
Andreas Hanemann, Martin Sailer, David Schmitz
NSDI
2010
13 years 9 months ago
Volley: Automated Data Placement for Geo-Distributed Cloud Services
: As cloud services grow to span more and more globally distributed datacenters, there is an increasingly urgent need for automated mechanisms to place application data across thes...
Sharad Agarwal, John Dunagan, Navendu Jain, Stefan...
TIFS
2010
186views more  TIFS 2010»
13 years 6 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
CCS
2006
ACM
13 years 11 months ago
Secure function evaluation with ordered binary decision diagrams
Privacy-preserving protocols allow multiple parties with private inputs to perform joint computation while preserving the privacy of their respective inputs. An important cryptogr...
Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh
SIGMOD
2007
ACM
167views Database» more  SIGMOD 2007»
14 years 7 months ago
Data currency in replicated DHTs
Distributed Hash Tables (DHTs) provide a scalable solution for data sharing in P2P systems. To ensure high data availability, DHTs typically rely on data replication, yet without ...
Reza Akbarinia, Esther Pacitti, Patrick Valduriez
« Prev « First page 1489 / 1526 Last » Next »