Sciweavers

2485 search results - page 337 / 497
» A Communicating Tree Model for Generating Network Applicatio...
Sort
View
EUROCRYPT
1998
Springer
15 years 8 months ago
Securing Threshold Cryptosystems against Chosen Ciphertext Attack
For the most compelling applications of threshold cryptosystems, security against chosen ciphertext attack is a requirement. However, prior to the results presented here, there ap...
Victor Shoup, Rosario Gennaro
WWW
2007
ACM
16 years 4 months ago
Consistency-preserving caching of dynamic database content
With the growing use of dynamic web content generated from relational databases, traditional caching solutions for throughput and latency improvements are ineffective. We describe...
Niraj Tolia, M. Satyanarayanan
INFOCOM
2010
IEEE
15 years 2 months ago
Optimal SINR-based Random Access
— Random access protocols, such as Aloha, are commonly modeled in wireless ad-hoc networks by using the protocol model. However, it is well-known that the protocol model is not a...
Amir Hamed Mohsenian Rad, Vincent W. S. Wong, Robe...
CLUSTER
2009
IEEE
15 years 10 months ago
Message passing for GPGPU clusters: CudaMPI
—We present and analyze two new communication libraries, cudaMPI and glMPI, that provide an MPI-like message passing interface to communicate data stored on the graphics cards of...
Orion S. Lawlor
INFOCOM
2000
IEEE
15 years 8 months ago
RADAR: An In-Building RF-Based User Location and Tracking System
The proliferation of mobile computing devices and local-area wireless networks has fostered a growing interest in location-aware systems and services. In this paper we present RAD...
Paramvir Bahl, Venkata N. Padmanabhan