Sciweavers

4761 search results - page 630 / 953
» Performance of Protocols
Sort
View
OSDI
2004
ACM
16 years 5 months ago
Secure Untrusted Data Repository (SUNDR)
SUNDR is a network file system designed to store data securely on untrusted servers. SUNDR lets clients detect any attempts at unauthorized file modification by malicious server o...
David Mazières, Dennis Shasha, Jinyuan Li, ...
PODS
2006
ACM
122views Database» more  PODS 2006»
16 years 5 months ago
Verification of communicating data-driven web services
We study the verification of compositions of Web Service peers which interact asynchronously by exchanging messages. Each peer has access to a local database and reacts to user in...
Alin Deutsch, Liying Sui, Victor Vianu, Dayou Zhou
PERCOM
2005
ACM
16 years 4 months ago
Cooperative Packet Forwarding in Multi-Domain Sensor Networks
Sensor networks are large scale networks of low-power devices that collaborate in order to perform a given task. The sensors are limited in battery energy, capacity and computatio...
Márk Félegyházi, Jean-Pierre ...
ARITH
2009
IEEE
15 years 11 months ago
Selected RNS Bases for Modular Multiplication
The selection of the elements of the bases in an RNS modular multiplication method is crucial and has a great impact in the overall performance. This work proposes specific sets ...
Jean-Claude Bajard, Marcelo E. Kaihara, Thomas Pla...
IAT
2009
IEEE
15 years 11 months ago
Bilateral Bargaining with One-Sided Two-Type Uncertainty
It is a challenging problem to find agents’ rational strategies in bargaining with incomplete information. In this paper we perform a game theoretic analysis of agents’ ratio...
Bo An, Nicola Gatti, Victor R. Lesser