Sciweavers

330 search results - page 12 / 66
» Controlling data disclosure in computational PIR protocols
Sort
View
FGCS
2008
159views more  FGCS 2008»
14 years 11 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
SC
2004
ACM
15 years 5 months ago
Experiences in Design and Implementation of a High Performance Transport Protocol
This paper describes our experiences in the development of the UDP-based Data Transport (UDT) protocol, an application level transport protocol used in distributed data intensive ...
Yunhong Gu, Xinwei Hong, Robert L. Grossman
IPPS
2006
IEEE
15 years 5 months ago
RAPID: an end-system aware protocol for intelligent data transfer over lambda grids
Next-generation e-Science applications will require the ability to transfer information at high data rates between distributed computing centers and data repositories. To support ...
Amitabha Banerjee, Wu-chun Feng, Biswanath Mukherj...
STORAGESS
2006
ACM
15 years 5 months ago
Access control for a replica management database
Distributed computation systems have become an important tool for scientific simulation, and a similarly distributed replica management system may be employed to increase the loc...
Justin M. Wozniak, Paul Brenner, Douglas Thain
SENSYS
2004
ACM
15 years 5 months ago
The dynamic behavior of a data dissemination protocol for network programming at scale
To support network programming, we present Deluge, a reliable data dissemination protocol for propagating large data objects from one or more source nodes to many other nodes over...
Jonathan W. Hui, David E. Culler