Sciweavers

949 search results - page 181 / 190
» exact 2008
Sort
View
MICRO
2008
IEEE
131views Hardware» more  MICRO 2008»
15 years 4 months ago
Token flow control
As companies move towards many-core chips, an efficient onchip communication fabric to connect these cores assumes critical importance. To address limitations to wire delay scala...
Amit Kumar 0002, Li-Shiuan Peh, Niraj K. Jha
NDSS
2008
IEEE
15 years 4 months ago
Usable PIR
In [22] we showed that existing single-server computational private information retrieval (PIR) protocols for the purpose of preserving client access patterns leakage are orders o...
Peter Williams, Radu Sion
NOMS
2008
IEEE
139views Communications» more  NOMS 2008»
15 years 4 months ago
Fast similarity search in peer-to-peer networks
Abstract—Peer-to-peer (P2P) systems show numerous advantages over centralized systems, such as load balancing, scalability, and fault tolerance, and they require certain function...
Thomas Bocek, Ela Hunt, David Hausheer, Burkhard S...
P2P
2008
IEEE
15 years 4 months ago
On the Impact of Greedy Strategies in BitTorrent Networks: The Case of BitTyrant
The success of BitTorrent has fostered the development of variants to its basic components. Some of the variants adopt greedy approaches aiming at exploiting the intrinsic altruis...
Damiano Carra, Giovanni Neglia, Pietro Michiardi
SASO
2008
IEEE
15 years 4 months ago
Towards Desynchronization of Multi-hop Topologies
In this paper we study desynchronization, a closelyrelated primitive to graph coloring. A valid graph coloring is an assignment of colors to nodes such that no node’s color is t...
Julius Degesys, Radhika Nagpal