Sciweavers

2392 search results - page 141 / 479
» Channel-Hopping Multiple Access
Sort
View
EUROCRYPT
2000
Springer
15 years 5 months ago
General Secure Multi-party Computation from any Linear Secret-Sharing Scheme
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set of n players can efficiently be based on any linear secret sharing scheme (LSSS) f...
Ronald Cramer, Ivan Damgård, Ueli M. Maurer
140
Voted
SIGMOD
1997
ACM
127views Database» more  SIGMOD 1997»
15 years 5 months ago
Infomaster: An Information Integration System
Infomaster is an information integration system that provides integrated access tomultiple distributed heterogeneous information sources on the Internet, thus giving the illusion ...
Michael R. Genesereth, Arthur M. Keller, Oliver M....
CLUSTER
2004
IEEE
15 years 5 months ago
An evaluation of the close-to-files processor and data co-allocation policy in multiclusters
In multicluster systems, and more generally, in grids, jobs may require co-allocation, i.e., the simultaneous allocation of resources such as processors and input files in multipl...
Hashim H. Mohamed, Dick H. J. Epema
EURONGI
2006
Springer
15 years 5 months ago
The Challenges of Merging Two Similar Structured Overlays: A Tale of Two Networks
Structured overlay networks is an important and interesting primitive that can be used by diverse peer-to-peer applications. Multiple overlays can result either because of network ...
Anwitaman Datta, Karl Aberer
FAST
2008
15 years 4 months ago
Measurement and Analysis of TCP Throughput Collapse in Cluster-based Storage Systems
Cluster-based and iSCSI-based storage systems rely on standard TCP/IP-over-Ethernet for client access to data. Unfortunately, when data is striped over multiple networked storage ...
Amar Phanishayee, Elie Krevat, Vijay Vasudevan, Da...