Sciweavers

9 search results - page 2 / 2
» Breaking the memory secrecy assumption
Sort
View
FOCS
2005
IEEE
13 years 11 months ago
The Complexity of Online Memory Checking
We consider the problem of storing a large file on a remote and unreliable server. To verify that the file has not been corrupted, a user could store a small private (randomized...
Moni Naor, Guy N. Rothblum
SSDBM
2006
IEEE
129views Database» more  SSDBM 2006»
13 years 11 months ago
Indexing Time-Evolving Data With Variable Lifetimes
Many applicationsstore data items for a pre-determined, finite length of time. Examples include slidingwindows over on-line data streams, where old data are dropped as the window...
Lukasz Golab, Piyush Prahladka, M. Tamer Özsu
ICPADS
2005
IEEE
13 years 10 months ago
Distributed Spanning Tree Algorithms for Large Scale Traversals
— The Distributed Spanning Tree (DST) is an overlay structure designed to be scalable. It supports the growth from small scale to large scale. The DST is a tree without bottlenec...
Sylvain Dahan
ANTSW
2010
Springer
13 years 3 months ago
Autonomous Multi-agent Cycle Based Patrolling
We introduce a novel multi-agent patrolling strategy. By assumption, the swarm of agents performing the task consists of very low capability ant-like agents. The agents have littl...
Yotam Elor, Alfred M. Bruckstein