Sciweavers

502 search results - page 25 / 101
» Deploying a New Hash Algorithm
Sort
View
DPD
2006
98views more  DPD 2006»
14 years 11 months ago
GRACE-based joins on active storage devices
Contemporary long-term storage devices feature powerful embedded processors and sizeable memory buffers. Active Storage Devices (ASD) is the hard disk technology that makes use of ...
Vassilis Stoumpos, Alex Delis
DCC
2004
IEEE
15 years 11 months ago
An Approximation to the Greedy Algorithm for Differential Compression of Very Large Files
We present a new differential compression algorithm that combines the hash value techniques and suffix array techniques of previous work. Differential compression refers to encodi...
Ramesh C. Agarwal, Suchitra Amalapurapu, Shaili Ja...
BLISS
2009
IEEE
15 years 26 days ago
Autonomous Physical Secret Functions and Clone-Resistant Identification
Self configuring VLSI technology architectures offer a new environment for creating novel security functions. Two such functions for physical security architectures are proposed t...
Wael Adi
IMC
2007
ACM
15 years 1 months ago
A global view of kad
Distributed hash tables (DHTs) have been actively studied in literature and many different proposals have been made on how to organize peers in a DHT. However, very few DHTs have...
Moritz Steiner, Taoufik En-Najjary, Ernst W. Biers...
CLIMA
2004
15 years 1 months ago
Distributed Algorithms for Dynamic Survivability of Multiagent Systems
Though multiagent systems (MASs) are being increasingly used, few methods exist to ensure survivability of MASs. All existing methods suffer from two flaws. First, a centralized su...
V. S. Subrahmanian, Sarit Kraus, Yingqian Zhang