Sciweavers

1898 search results - page 213 / 380
» Weak Keys for IDEA
Sort
View
ICS
2010
Tsinghua U.
14 years 19 days ago
InterferenceRemoval: removing interference of disk access for MPI programs through data replication
As the number of I/O-intensive MPI programs becomes increasingly large, many efforts have been made to improve I/O performance, on both software and architecture sides. On the sof...
Xuechen Zhang, Song Jiang
CCS
2008
ACM
14 years 5 days ago
Black-box accountable authority identity-based encryption
A well-known concern in the setting of identity based encryption is that the PKG is all powerful and has to be completely trusted. To mitigate this problem, the notion of Accounta...
Vipul Goyal, Steve Lu, Amit Sahai, Brent Waters
CONEXT
2005
ACM
14 years 4 days ago
Root cause analysis for long-lived TCP connections
While the applications using the Internet have changed over time, TCP is still the dominating transport protocol that carries over 90% of the total traffic. Throughput is the key...
Matti Siekkinen, Guillaume Urvoy-Keller, Ernst W. ...
ICPW
2007
13 years 11 months ago
Mind the gap!: Transcending the tunnel view on ontology engineering
The key objective of communal knowledge sharing at the scale of the World Wide Web is the ability to collaborate and integrate within and between communities. Ontologies, being fo...
Pieter De Leenheer, Stijn Christiaens
NETWORKING
2007
13 years 11 months ago
Multiple Identities in BitTorrent Networks
Abstract. Peer-to-peer (P2P) file sharing systems have become ubiquitous and at present the BitTorrent (BT) based P2P systems are very popular and successful. It has been argued t...
Jin Sun, Anirban Banerjee, Michalis Faloutsos