Sciweavers

620 search results - page 103 / 124
» The edge-flipping group of a graph
Sort
View
INFOCOM
2008
IEEE
14 years 2 months ago
Cross-Monotonic Multicast
—In the routing and cost sharing of multicast towards a group of potential receivers, cross-monotonicity is a property that states a user’s payment can only be smaller when ser...
Zongpeng Li
IPPS
2007
IEEE
14 years 1 months ago
Stack Trace Analysis for Large Scale Debugging
We present the Stack Trace Analysis Tool (STAT) to aid in debugging extreme-scale applications. STAT can reduce problem exploration spaces from thousands of processes to a few by ...
Dorian C. Arnold, Dong H. Ahn, Bronis R. de Supins...
IPPS
2007
IEEE
14 years 1 months ago
Optimization and evaluation of parallel I/O in BIPS3D parallel irregular application
This paper presents the optimization and evaluation of parallel I/O for the BIPS3D parallel irregular application, a 3-dimensional simulation of BJT and HBT bipolar devices. The p...
Rosa Filgueira, David E. Singh, Florin Isaila, Jes...
COMSWARE
2007
IEEE
14 years 1 months ago
Enhanced Topolgoy Formation Protocol for IEEE 802.11 WLAN based Mesh Networks
—This paper deals with the topology formation schemes in the IEEE 802.11 based wireless mesh network. The recent standardization effort for specifying a wireless distribution sys...
Deepesh Man Shrestha, Young-Bae Ko
CRYPTO
2007
Springer
132views Cryptology» more  CRYPTO 2007»
14 years 1 months ago
How Should We Solve Search Problems Privately?
Abstract. Secure multiparty computation allows a group of distrusting parties to jointly compute a (possibly randomized) function of their inputs. However, it is often the case tha...
Amos Beimel, Tal Malkin, Kobbi Nissim, Enav Weinre...