Sciweavers

3532 search results - page 696 / 707
» Overlay networks with class
Sort
View
EUROCRYPT
2008
Springer
15 years 1 months ago
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
The Universal Composability framework was introduced by Canetti to study the security of protocols which are concurrently executed with other protocols in a network environment. U...
Nishanth Chandran, Vipul Goyal, Amit Sahai
SODA
2008
ACM
104views Algorithms» more  SODA 2008»
15 years 1 months ago
Ranged hash functions and the price of churn
Ranged hash functions generalize hash tables to the setting where hash buckets may come and go over time, a typical case in distributed settings where hash buckets may correspond ...
James Aspnes, Muli Safra, Yitong Yin
EON
2003
15 years 1 months ago
Racer: A Core Inference Engine for the Semantic Web
In this paper we describe Racer, which can be considered as a core inference engine for the semantic web. The Racer inference server offers two APIs that are already used by at le...
Volker Haarslev, Ralf Möller
RBAC
2000
129views more  RBAC 2000»
15 years 1 months ago
Enabling technologies for role based online decision engines
: Enabling Technologies for Role Based Online Decision Engines Thomas Hildmann, Thomas Gebhardt 22-Feb-2000 The goal of our work at the Technical University of Berlin is to develop...
Thomas Gebhardt, Thomas Hildmann
SOSP
1997
ACM
15 years 1 months ago
Towards Transparent and Efficient Software Distributed Shared Memory
Despite a large research effort, software distributed shared memory systems have not been widely used to run parallel applications across clusters of computers. The higher perform...
Daniel J. Scales, Kourosh Gharachorloo