One recent approach to build highly scalable and robust networked virtual environments (NVEs) is by using peer-to-peer overlay networks. Voronoi-based Overlay Network (VON) has be...
Most protocols for distributed, fault-tolerant computation, or multi-party computation (MPC), provide security guarantees in an all-or-nothing fashion: If the number of corrupted p...
A “Storage-Area Network” (SAN) comprises computers (“Initiators”), storage “block devices” (“Targets”), and a Controller(s). Most SANs use the SCSI protocol over v...
Advances in multiprocessor interconnect technologyare leading to high performance networks. However, software overheadsassociated with message passing are limiting the processors ...
Debashis Basak, Dhabaleswar K. Panda, Mohammad Ban...
Abstract. Computer games played over the Internet have recently become an important class of distributed applications. In this paper we present a novel proxy server-network topolog...