Sciweavers

565 search results - page 67 / 113
» Parallel Querying with Non-Dedicated Computers
Sort
View
HPCC
2007
Springer
15 years 7 months ago
A Proactive Method for Content Distribution in a Data Indexed DHT Overlay
In a data-indexed DHT overlay network, published data annotations form distributed databases. Queries are distributed to these databases in a nonuniform way. Constructing content d...
Bassam A. Alqaralleh, Chen Wang, Bing Bing Zhou, A...
HPDC
2002
IEEE
15 years 6 months ago
A Decentralized, Adaptive Replica Location Mechanism
We describe a decentralized, adaptive mechanism for replica location in wide-area distributed systems. Unlike traditional, hierarchical (e.g, DNS) and more recent (e.g., CAN, Chor...
Matei Ripeanu, Ian T. Foster
CCGRID
2010
IEEE
15 years 2 months ago
Dynamic TTL-Based Search in Unstructured Peer-to-Peer Networks
Abstract--Resource discovery is a challenging issue in unstructured peer-to-peer networks. Blind search approaches, including flooding and random walks, are the two typical algorit...
Imen Filali, Fabrice Huet
CCGRID
2009
IEEE
15 years 5 months ago
Hierarchical Caches for Grid Workflows
From personal software to advanced systems, caching mechanisms have steadfastly been a ubiquitous means for reducing workloads. It is no surprise, then, that under the grid and clu...
David Chiu, Gagan Agrawal
CRYPTO
2005
Springer
164views Cryptology» more  CRYPTO 2005»
15 years 7 months ago
Composition Does Not Imply Adaptive Security
We study the question whether the sequential or parallel composition of two functions, each indistinguishable from a random function by non-adaptive distinguishers is secure agains...
Krzysztof Pietrzak