Sciweavers

954 search results - page 101 / 191
» From brains to bytes
Sort
View
75
Voted
CCS
2009
ACM
15 years 5 months ago
HAIL: a high-availability and integrity layer for cloud storage
We introduce HAIL (High-Availability and Integrity Layer), a distributed cryptographic system that allows a set of servers to prove to a client that a stored file is intact and r...
Kevin D. Bowers, Ari Juels, Alina Oprea
70
Voted
FPGA
2009
ACM
285views FPGA» more  FPGA 2009»
15 years 5 months ago
PERG-Rx: a hardware pattern-matching engine supporting limited regular expressions
PERG is a pattern matching engine designed for locating predefined byte string patterns (rules) from the ClamAV virus signature database in a data stream. This paper presents PERG...
Johnny Tsung Lin Ho, Guy G. Lemieux
79
Voted
INFOCOM
2009
IEEE
15 years 4 months ago
Impacts of Peer Characteristics on P2PTV Networks Scalability
—A P2PTV system allows users to watch live video streams redistributed by other users via a peer-to-peer (P2P) network. In an ideal world, each peer in a P2P network would be abl...
Khaldoon Shami, Damien Magoni, Hyunseok Chang, Wen...
83
Voted
IPPS
2008
IEEE
15 years 4 months ago
Low power/area branch prediction using complementary branch predictors
Although high branch prediction accuracy is necessary for high performance, it typically comes at the cost of larger predictor tables and/or more complex prediction algorithms. Un...
Resit Sendag, Joshua J. Yi, Peng-fei Chuang, David...
SSDBM
2008
IEEE
150views Database» more  SSDBM 2008»
15 years 4 months ago
Summarizing Two-Dimensional Data with Skyline-Based Statistical Descriptors
Much real data consists of more than one dimension, such as financial transactions (eg, price × volume) and IP network flows (eg, duration × numBytes), and capture relationship...
Graham Cormode, Flip Korn, S. Muthukrishnan, Dives...