Sciweavers

4987 search results - page 243 / 998
» Fuzzifying P Systems
Sort
View
TCC
2007
Springer
146views Cryptology» more  TCC 2007»
15 years 10 months ago
Conjunctive, Subset, and Range Queries on Encrypted Data
We construct public-key systems that support comparison queries (x ≥ a) on encrypted data as well as more general queries such as subset queries (x ∈ S). These systems support...
Dan Boneh, Brent Waters
HIPC
2007
Springer
15 years 10 months ago
Structuring Unstructured Peer-to-Peer Networks
Flooding is a fundamental building block of unstructured peer-to-peer (P2P) systems. In this paper, we investigate techniques to improve the performance of flooding. In particular...
Stefan Schmid, Roger Wattenhofer
CONEXT
2006
ACM
15 years 8 months ago
On the benefits of synchronized playout in peer-to-peer streaming
In this paper we examine the impact of the adopted playout policy on the overall performance of a P2P streaming system. It is argued and showed that adopting (popular) playout pol...
Constantinos Vassilakis, Nikolaos Laoutaris, Ioann...
HYBRID
2010
Springer
15 years 11 months ago
Comparison of overapproximation methods for stability analysis of networked control systems
W. P. M. H. Heemels, Nathan van de Wouw, Rob H. Gi...
P2P
2009
IEEE
137views Communications» more  P2P 2009»
15 years 11 months ago
Analysis of Failure Correlation Impact on Peer-to-Peer Storage Systems
Abstract—Peer-to-peer storage systems aim to provide a reliable long-term storage at low cost. In such systems, peers fail continuously, hence, the necessity of self-repairing me...
Olivier Dalle, Frédéric Giroire, Jul...