Sciweavers

648 search results - page 101 / 130
» Authenticated hash tables
Sort
View
153
Voted
IEEEPACT
2005
IEEE
15 years 11 months ago
Communication Optimizations for Fine-Grained UPC Applications
Global address space languages like UPC exhibit high performance and portability on a broad class of shared and distributed memory parallel architectures. The most scalable applic...
Wei-Yu Chen, Costin Iancu, Katherine A. Yelick
154
Voted
INFOCOM
2005
IEEE
15 years 11 months ago
FISSIONE: a scalable constant degree and low congestion DHT scheme based on Kautz graphs
Abstract— The distributed hash table (DHT) scheme has become the core component of many large-scale peer-to-peer networks. Degree, diameter, and congestion are important measures...
Dongsheng Li, Xicheng Lu, Jie Wu
ISPAN
2005
IEEE
15 years 11 months ago
Overlay networks with class
We define a family of Distributed Hash Table systems whose aim is to combine routing efficiency of the randomized networks — i.e. average path length O(log n/ log log n) vs. t...
Giovanni Chiola, Gennaro Cordasco, Luisa Gargano, ...
P2P
2005
IEEE
152views Communications» more  P2P 2005»
15 years 11 months ago
On Overlay Schemes to Support Point-in-Range Queries for Scalable Grid Resource Discovery
A resource directory is a critical component of a Grid architecture. P2P computing paradigm could address some of the scalability issues that make distributed resource discovery s...
Liping Chen, K. Selçuk Candan, Jun'ichi Tat...
161
Voted
WACV
2005
IEEE
15 years 11 months ago
3D Recognition and Segmentation of Objects in Cluttered Scenes
In this paper we present a novel view point independent range image segmentation and recognition approach. We generate a library of 3D models off-line and represent each model wit...
Ajmal S. Mian, Mohammed Bennamoun, Robyn A. Owens