Sciweavers

3047 search results - page 161 / 610
» A Secure Distributed Search System
Sort
View
87
Voted
IPPS
2006
IEEE
15 years 9 months ago
Model-based evaluation of search strategies in peer-to-peer networks
This paper exploits a previously developed analytical modeling framework to compare several variations of the basic flooding search strategy in unstructured decentralized peer-to...
Rossano Gaeta, Matteo Sereno
143
Voted
SODA
2004
ACM
124views Algorithms» more  SODA 2004»
15 years 4 months ago
Family trees: an ordered dictionary with optimal congestion, locality, degree, and search time
We consider the problem of storing an ordered dictionary data structure over a distributed set of nodes. In contrast to traditional sequential data structures, distributed data st...
Kevin C. Zatloukal, Nicholas J. A. Harvey
CDC
2010
IEEE
147views Control Systems» more  CDC 2010»
14 years 10 months ago
Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks
The security threat posed by malware in mobile wireless networks can be countered through immunization using security patches. The distribution of patches however consumes bandwidt...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
125
Voted
EDBT
2008
ACM
161views Database» more  EDBT 2008»
16 years 3 months ago
Load distribution of analytical query workloads for database cluster architectures
Enterprises may have multiple database systems spread across the organization for redundancy or for serving different applications. In such systems, query workloads can be distrib...
Thomas Phan, Wen-Syan Li
CCS
2006
ACM
15 years 7 months ago
Finding the original point set hidden among chaff
In biometric identification, a fingerprint is typically represented as a set of minutiae which are 2D points. A method [4] to protect the fingerprint template hides the minutiae b...
Ee-Chien Chang, Ren Shen, Francis Weijian Teo