Sciweavers

941 search results - page 77 / 189
» The Second Order Particle System
Sort
View
SP
2010
IEEE
206views Security Privacy» more  SP 2010»
15 years 8 months ago
Revocation Systems with Very Small Private Keys
In this work, we design a method for creating public key broadcast encryption systems. Our main technical innovation is based on a new “two equation” technique for revoking us...
Allison B. Lewko, Amit Sahai, Brent Waters
CPHYSICS
2007
71views more  CPHYSICS 2007»
15 years 4 months ago
Simulation of n-qubit quantum systems. III. Quantum operations
During the last decade, several quantum information protocols, such as quantum key distribution, teleportation or quantum computation, have attracted a lot of interest. Despite th...
T. Radtke, S. Fritzsche
MST
2006
136views more  MST 2006»
15 years 4 months ago
Simple Efficient Load-Balancing Algorithms for Peer-to-Peer Systems
Load balancing is a critical issue for the efficient operation of peerto-peer networks. We give two new load-balancing protocols whose provable performance guarantees are within a...
David R. Karger, Matthias Ruhl
CODES
2010
IEEE
15 years 1 months ago
Hardware/software optimization of error detection implementation for real-time embedded systems
This paper presents an approach to system-level optimization of error detection implementation in the context of fault-tolerant realtime distributed embedded systems used for safe...
Adrian Lifa, Petru Eles, Zebo Peng, Viacheslav Izo...
CCGRID
2006
IEEE
15 years 10 months ago
Optimal Replica Placement Strategy for Hierarchical Data Grid Systems
Grid computing is an important mechanism for utilizing distributed computing resources. These resources are distributed in different geographical locations, but are organized to p...
Pangfeng Liu, Jan-Jan Wu