Sciweavers

3047 search results - page 386 / 610
» A Secure Distributed Search System
Sort
View
CCS
2008
ACM
15 years 7 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
138
Voted
ATAL
2004
Springer
15 years 10 months ago
Brain Meets Brawn: Why Grid and Agents Need Each Other
The Grid and agent communities both develop concepts and mechanisms for open distributed systems, albeit from different perspectives. The Grid community has historically focused o...
Ian T. Foster, Nicholas R. Jennings, Carl Kesselma...
GLOBECOM
2008
IEEE
15 years 11 months ago
Joint Power Loading of Data and Pilots in OFDM Using Imperfect Channel State Information at the Transmitter
— The search for optimality in the design of channel precoders and training symbols in block processing communication systems is one of paramount importance. Finding the best tra...
Chitaranjan P. Sukumar, Ricardo Merched, Ahmed M. ...
ISPAN
2002
IEEE
15 years 10 months ago
On Locality of Dominating Set in Ad Hoc Networks with Switch-On/Off Operations
Routing based on a connected dominating set is a promising approach, where the search space for a route is reduced to the hosts in the set. A set is dominating if all the hosts in...
Jie Wu, Fei Dai
MIDDLEWARE
2004
Springer
15 years 10 months ago
PoliPer: policies for mobile and pervasive environments
The need for sharing is well known in a large number of distributed applications. These applications are difficult to develop either for fully wired or mobile wireless networks. ...
Luís Veiga, Paulo Ferreira