Sciweavers

1005 search results - page 171 / 201
» Practical Secure Function Evaluation
Sort
View
IPPS
2005
IEEE
14 years 1 months ago
Modeling and Taming Parallel TCP on the Wide Area Network
— Parallel TCP flows are broadly used in the high performance distributed computing community to enhance network throughput, particularly for large data transfers. Previous rese...
Dong Lu, Yi Qiao, Peter A. Dinda, Fabián E....
MOBIQUITOUS
2005
IEEE
14 years 1 months ago
StateSnap: A Snapshot-based Interface for State-Reproductable Operation of Networked Appliances
This paper describes a snapshot-based interface for networked appliances operations that allows users to store and reproduce the conditions of media contents in those appliances b...
Naohiko Kohtake, Takeshi Iwamoto, Genta Suzuki, Sh...
EUROCRYPT
2004
Springer
14 years 1 months ago
Merkle Tree Traversal in Log Space and Time
Abstract. We present a technique for Merkle tree traversal which requires only logarithmic space and time1 . For a tree with N nodes, our algorithm computes sequential tree leaves ...
Michael Szydlo
DASFAA
2010
IEEE
168views Database» more  DASFAA 2010»
14 years 28 days ago
Temporal Top-k Search in Social Tagging Sites Using Multiple Social Networks
In social tagging sites, users are provided easy ways to create social networks, to post and share items like bookmarks, videos, photos and articles, along with comments and tags. ...
Wenyu Huo, Vassilis J. Tsotras
DISCEX
2003
IEEE
14 years 28 days ago
Dynamic Authorization and Intrusion Response in Distributed Systems
This paper¢ presents an authorization framework for supporting fine-grained access control policies enhanced with light-weight intrusion/misuse detectors and response capabiliti...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim