Sciweavers

59 search results - page 2 / 12
» Sharing Revisited
Sort
View
CRYPTO
2009
Springer
111views Cryptology» more  CRYPTO 2009»
13 years 9 months ago
The Round Complexity of Verifiable Secret Sharing Revisited
The round complexity of interactive protocols is one of their most important complexity measures. In this work we prove that existing lower bounds for the round complexity of VSS c...
Arpita Patra, Ashish Choudhary, Tal Rabin, C. Pand...
KIVS
2005
Springer
13 years 10 months ago
P2P Replication Revisited: Mobile Infrastructures
Abstract: Traffic engineering in P2P networks deals with organizing overlay networks. The challenge of unavailability has not been mastered yet. Considering the resource allocatio...
Jens O. Oberender, Hermann de Meer
IPCCC
2006
IEEE
13 years 11 months ago
dRamDisk: efficient RAM sharing on a commodity cluster
Recent work on distributed RAM sharing has largely focused on leveraging low-latency networking technologies to optimize remote memory access. In contrast, we revisit the idea of ...
Vassil Roussev, Golden G. Richard III, Daniel Ting...
EVOW
2010
Springer
14 years 2 days ago
Enhancing Genetic Algorithms by a Trie-Based Complete Solution Archive
Genetic algorithms (GAs) share a common weakness with most other metaheuristics: Candidate solutions are in general revisited multiple times, lowering diversity and wasting preciou...
Günther R. Raidl, Bin Hu
EVOW
2010
Springer
14 years 2 days ago
Gaussian Adaptation Revisited - An Entropic View on Covariance Matrix Adaptation
Abstract. We revisit Gaussian Adaptation (GaA), a black-box optimizer for discrete and continuous problems that has been developed in the late 1960’s. This largely neglected sear...
Christian L. Müller, Ivo F. Sbalzarini