Sciweavers

176 search results - page 3 / 36
» The Cost of Privatization
Sort
View
SIAMDM
2010
113views more  SIAMDM 2010»
13 years 2 months ago
The VPN Problem with Concave Costs
We consider the following network design problem. We are given an undirected network with costs on the edges, a set of terminals, and an upper bound for each terminal limiting the ...
Samuel Fiorini, Gianpaolo Oriolo, Laura Sanit&agra...
CIAC
2006
Springer
103views Algorithms» more  CIAC 2006»
13 years 11 months ago
Provisioning a Virtual Private Network Under the Presence of Non-communicating Groups
Virtual private network design in the hose model deals with the reservation of capacities in a weighted graph such that the terminals in this network can communicate with one anoth...
Friedrich Eisenbrand, Edda Happ
IWSEC
2007
Springer
14 years 1 months ago
Accredited Symmetrically Private Information Retrieval
Abstract. With the digitization of society and the continuous migration of services to the electronic world, individuals have lost significant control over their data. In this pap...
Mohamed Layouni
SPAA
1992
ACM
13 years 11 months ago
Subset Barrier Synchronization on a Private-Memory Parallel System
A global barrier synchronizes all processors in a parallel system. This paper investigates algorithms that allow disjoint subsets of processors to synchronize independently and in...
Anja Feldmann, Thomas R. Gross, David R. O'Hallaro...
ESORICS
2006
Springer
13 years 11 months ago
Private Information Retrieval Using Trusted Hardware
Abstract. Many theoretical PIR (Private Information Retrieval) constructions have been proposed in the past years. Though information theoretically secure, most of them are impract...
Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao