Sciweavers

2924 search results - page 330 / 585
» Lower Bounds in Distributed Computing
Sort
View
EUROCRYPT
2003
Springer
15 years 9 months ago
Two-Threshold Broadcast and Detectable Multi-party Computation
Classical distributed protocols like broadcast or multi-party computation provide security as long as the number of malicious players f is bounded by some given threshold t, i.e., ...
Matthias Fitzi, Martin Hirt, Thomas Holenstein, J&...
VISSYM
2004
15 years 6 months ago
Isosurface Computation Made Simple
This paper presents a simple approach for rendering isosurfaces of a scalar field. Using the vertex programming capability of commodity graphics cards, we transfer the cost of com...
Valerio Pascucci
148
Voted
PVM
2007
Springer
15 years 10 months ago
A Virtual Test Environment for MPI Development: Quick Answers to Many Small Questions
Abstract. MPI implementations are faced with growingly complex network configurations containing multiple network interfaces per node, NAT, or dual stacks. To implement handling l...
Wolfgang Schnerring, Christian Kauhaus, Dietmar Fe...
148
Voted
STOC
2006
ACM
174views Algorithms» more  STOC 2006»
16 years 4 months ago
Edge-disjoint paths in Planar graphs with constant congestion
We study the maximum edge-disjoint paths problem in undirected planar graphs: given a graph G and node pairs s1t1, s2t2, . . ., sktk, the goal is to maximize the number of pairs t...
Chandra Chekuri, Sanjeev Khanna, F. Bruce Shepherd
CISS
2008
IEEE
15 years 11 months ago
Appropriate control of wireless networks with flow level dynamics
Abstract— We consider the network control problem for wireless networks with flow level dynamics under the general k-hop interference model. In particular, we investigate the co...
Long Le, Ravi R. Mazumdar