Sciweavers

4438 search results - page 46 / 888
» On the Distribution of Keys by Hashing
Sort
View
INTR
2006
87views more  INTR 2006»
14 years 11 months ago
Agyaat: mutual anonymity over structured P2P networks
Purpose
Aameek Singh, Bugra Gedik, Ling Liu
IPPS
2008
IEEE
15 years 6 months ago
A hash-TLB approach for MMU virtualization in xen/IA64
Xiantao Zhang, Anthony X. F. Xu, Qi Li, David K. Y...
ACNS
2011
Springer
254views Cryptology» more  ACNS 2011»
14 years 3 months ago
Linear Analysis of Reduced-Round CubeHash
Abstract. Recent developments in the field of cryptanalysis of hash functions has inspired NIST to announce a competition for selecting a new cryptographic hash function to join t...
Tomer Ashur, Orr Dunkelman
P2P
2008
IEEE
222views Communications» more  P2P 2008»
15 years 6 months ago
IgorFs: A Distributed P2P File System
IgorFs is a distributed, decentralized peer-to-peer (P2P) file system that is completely transparent to the user. It is built on top of the Igor peer-to-peer overlay network, whi...
Bernhard Amann, Benedikt Elser, Yaser Houri, Thoma...
PPOPP
2006
ACM
15 years 5 months ago
Exploiting distributed version concurrency in a transactional memory cluster
We investigate a transactional memory runtime system providing scaling and strong consistency for generic C++ and SQL applications on commodity clusters. We introduce a novel page...
Kaloian Manassiev, Madalin Mihailescu, Cristiana A...