Sciweavers

18374 search results - page 87 / 3675
» Applications for data hiding
Sort
View
HPDC
2000
IEEE
15 years 10 months ago
RAID-x: A New Distributed Disk Array for I/O-Centric Cluster Computing
A new RAID-x (redundant array of inexpensive disks at level x) architecture is presented for distributed I/O processing on a serverless cluster of computers. The RAID-x architectu...
Kai Hwang, Hai Jin, Roy S. C. Ho
IPPS
2000
IEEE
15 years 10 months ago
DyRecT: Software Support for Adaptive Parallelism on NOWs
Abstract. In this paper, we describe DyRecT (Dynamic Reconfiguration Toolkit) a software library that allows programmers to develop adaptively parallel message-passing MPI program...
Etienne Godard, Sanjeev Setia, Elizabeth L. White
CISC
2008
Springer
117views Cryptology» more  CISC 2008»
15 years 7 months ago
Strong Anonymous Signatures
The notion of anonymous signatures has recently been formalized by [18], which captures an interesting property that a digital signature can sometimes hide the identity of the sign...
Rui Zhang 0002, Hideki Imai
174
Voted
IMCSIT
2010
15 years 9 days ago
Multi-level Parallelization with Parallel Computational Services in BeesyCluster
The paper presents a concept, implementation and real examples of dynamic parallelization of computations using services derived from MPI applications deployed in the BeesyCluster ...
Pawel Czarnul
SRDS
2007
IEEE
15 years 11 months ago
Evaluating Byzantine Quorum Systems
Replication is a mechanism extensively used to guarantee the availability and good performance of data storage services. Byzantine Quorum Systems (BQS) have been proposed as a sol...
Wagner Saback Dantas, Alysson Neves Bessani, Joni ...