Sciweavers

106 search results - page 14 / 22
» Two New Efficient PIR-Writing Protocols
Sort
View
ACNS
2006
Springer
138views Cryptology» more  ACNS 2006»
13 years 11 months ago
Syntax-Driven Private Evaluation of Quantified Membership Queries
Abstract. Membership queries are basic predicate operations that apply to datasets. Quantifications of such queries express global properties between datasets, including subset inc...
Aggelos Kiayias, Antonina Mitrofanova
HPDC
1999
IEEE
14 years 5 days ago
The UNICORE Architecture Seamless Access to Distributed Resources
Seamless access to different systems of different vendors at different sites is an important prerequisite to effective and efficient use of distributed resources. Learning about n...
Mathilde Romberg
CONEXT
2009
ACM
13 years 9 months ago
Scaling all-pairs overlay routing
This paper presents and experimentally evaluates a new algorithm for efficient one-hop link-state routing in full-mesh networks. Prior techniques for this setting scale poorly, as...
David Sontag, Yang Zhang, Amar Phanishayee, David ...
JDCTA
2010
186views more  JDCTA 2010»
13 years 2 months ago
A Positioning Method in Wireless Sensor Networks Using Genetic Algorithms
The recent area of Wireless Sensor Networks (WSNs) has brought new challenges to developers of net-work protocols. Energy consumption and network coverage are two important challe...
Mojtaba Romoozi, Hossein Ebrahimpour-Komleh
SIROCCO
2004
13 years 9 months ago
Long-Lived Rambo: Trading Knowledge for Communication
Shareable data services providing consistency guarantees, such as atomicity (linearizability), make building distributed systems easier. However, combining linearizability with ef...
Chryssis Georgiou, Peter M. Musial, Alexander A. S...