Sciweavers

2563 search results - page 255 / 513
» Performance Evaluation of Distributed Computing over Heterog...
Sort
View
145
Voted
HPCA
2008
IEEE
16 years 3 months ago
Single-level integrity and confidentiality protection for distributed shared memory multiprocessors
Multiprocessor computer systems are currently widely used in commercial settings to run critical applications. These applications often operate on sensitive data such as customer ...
Brian Rogers, Chenyu Yan, Siddhartha Chhabra, Milo...
131
Voted
CCS
2006
ACM
15 years 7 months ago
Secure function evaluation with ordered binary decision diagrams
Privacy-preserving protocols allow multiple parties with private inputs to perform joint computation while preserving the privacy of their respective inputs. An important cryptogr...
Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh
126
Voted
QUESTA
2010
131views more  QUESTA 2010»
15 years 1 months ago
Asymptotically optimal parallel resource assignment with interference
Motivated by scheduling in cellular wireless networks and resource allocation in computer systems, we study a service facility with two classes of users having heterogeneous servi...
Maaike Verloop, R. Núñez Queija
APSCC
2008
IEEE
15 years 5 months ago
ABSRP- A Service Discovery Approach for Vehicular Ad Hoc Networks
A vehicular ad-hoc network (VANET) is a network of intelligent vehicles that communicate with other vehicles in the network. The main objective of VANET is to provide comfort and ...
Brijesh Kadri Mohandas, Amiya Nayak, Kshirasagar N...
162
Voted
MM
2005
ACM
179views Multimedia» more  MM 2005»
15 years 9 months ago
rStream: resilient peer-to-peer streaming with rateless codes
The inherent instability and unreliability of peer-to-peer networks introduce several fundamental engineering challenges to multimedia streaming over peer-to-peer networks. First,...
Chuan Wu, Baochun Li