Sciweavers

2924 search results - page 325 / 585
» Lower Bounds in Distributed Computing
Sort
View
165
Voted
TDSC
2011
14 years 11 months ago
Reliability for Networked Storage Nodes
High-end enterprise storage has traditionally consisted of monolithic systems with customized hardware, multiple redundant components and paths, and no single point of failure. Di...
K. K. Rao, James Lee Hafner, Richard A. Golding
ASAP
2006
IEEE
106views Hardware» more  ASAP 2006»
15 years 10 months ago
Throughput Optimized SHA-1 Architecture Using Unfolding Transformation
In this paper, we analyze the theoretical delay bound of the SHA-1 algorithm and propose architectures to achieve high throughput hardware implementations which approach this boun...
Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede
CDC
2009
IEEE
285views Control Systems» more  CDC 2009»
15 years 2 months ago
Adaptive randomized algorithm for finding eigenvector of stochastic matrix with application to PageRank
Abstract-- The problem of finding the eigenvector corresponding to the largest eigenvalue of a stochastic matrix has numerous applications in ranking search results, multi-agent co...
Alexander V. Nazin, Boris T. Polyak
142
Voted
TCC
2010
Springer
179views Cryptology» more  TCC 2010»
16 years 1 months ago
Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs
A family of trapdoor functions is one-way under correlated inputs if no efficient adversary can invert it even when given the value of the function on multiple correlated inputs. T...
Yevgeniy Vahlis
INFOCOM
2008
IEEE
15 years 11 months ago
A New ACK Policy To Mitigate the Effects of Coexisting IEEE 802.11/802.11e Devices
— In IEEE 802.11 wireless networks, EDCA users’ performance may be degraded because of the existence of legacy users and therefore would get a lower priority service. Such effe...
Haithem Al-Mefleh, J. Morris Chang