Sciweavers

46 search results - page 7 / 10
» Sporadic Server revisited
Sort
View
CORR
2007
Springer
89views Education» more  CORR 2007»
13 years 7 months ago
Evaluating Personal Archiving Strategies for Internet-based Information
Internet-based personal digital belongings present different vulnerabilities than locally stored materials. We use responses to a survey of people who have recovered lost websites...
Catherine C. Marshall, Frank McCown, Michael L. Ne...
HPCA
2008
IEEE
14 years 7 months ago
Fabric convergence implications on systems architecture
Converged fabrics that support data, storage, and cluster networking in a unified fashion are desirable for their cost and manageability advantages. Recent trends towards higher-b...
Kevin Leigh, Parthasarathy Ranganathan, Jaspal Sub...
IPCCC
2006
IEEE
14 years 1 months ago
dRamDisk: efficient RAM sharing on a commodity cluster
Recent work on distributed RAM sharing has largely focused on leveraging low-latency networking technologies to optimize remote memory access. In contrast, we revisit the idea of ...
Vassil Roussev, Golden G. Richard III, Daniel Ting...
CRYPTO
2004
Springer
127views Cryptology» more  CRYPTO 2004»
14 years 15 days ago
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange
Abstract. In this paper we revisit one of the most popular passwordbased key exchange protocols, namely the OKE (for Open Key Exchange) scheme, proposed by Luck in 1997. Our result...
Dario Catalano, David Pointcheval, Thomas Pornin
EMNETS
2007
13 years 11 months ago
SeeDTV: deployment-time validation for wireless sensor networks
Deployment of a wireless sensor network (WSN) system is a critical step because theoretical models and assumptions often differ from real environmental characteristics and perform...
H. Liu, Leo Selavo, John A. Stankovic