• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 343
Next 10 →

1Energy and Bandwidth-Efficient Key Distribution in Wireless Ad-Hoc Networks: A Cross-Layer Approach

by Javier Salido, Loukas Lazos, Radha Poovendran
"... Abstract — We address the problem of resource-efficient access control for group communications in wireless ad-hoc networks. Restricting the access to group data can be reduced to the problem of securely distributing cryptographic keys to group members, known as the key distribution problem (KDP). W ..."
Abstract - Add to MetaCart
efficiency of multicasting, and establish an analytical worst-case bound for it. Finally, we propose On-line VP3 which dynamically updates the key assignment structure according to the dynamics of the communication group in a resource-efficient way. Index Terms — key distribution, secure group communication

On Path Selection for Traffic with Bandwidth Guarantees

by Qingming Ma, Peter Steenkiste - In Proceedings of IEEE International Conference on Network Protocols , 1997
"... Transmission of multimedia streams imposesa minimum-bandwidth requirementon the path being used to ensureend-to-end Quality-ofService (QoS) guarantees. While any shortest-path algorithm can be used to select a feasible path, additional constraints that limit resource consumption and balance the netw ..."
Abstract - Cited by 190 (7 self) - Add to MetaCart
to requests for different bandwidths, robustness to inaccurate routing information, and sensitivity to the routing information update frequency. It evaluates not only the performance of these algorithms for the sessions with bandwidth guarantees, but also their impact on the lower priority best

Practical Off-chip Meta-data for Temporal Memory Streaming

by Thomas F. Wenisch, Michael Ferdman, Anastasia Ailamaki, Babak Falsafi, Andreas Moshovos
"... Prior research demonstrates that temporal memory streaming and related address-correlating prefetchers improve performance of commercial server workloads though increased memory level parallelism. Unfortunately, these prefetchers require large on-chip meta-data storage, making previously-proposed de ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
-data off chip: minimal off-chip lookup latency, bandwidthefficient meta-data updates, and off-chip lookup amortized over many prefetches. In this work, we show: (1) minimal off-chip meta-data lookup latency can be achieved through a hardware-managed main memory hash table, (2) bandwidth-efficient updates

Authentication and Integrity in Outsourced Databases

by Einar Mykletun, Maithili Narasimha, Gene Tsudik , 2004
"... In the Outsourced Database (ODB) model, organizations outsource their data management needs to an external service provider. The service provider hosts clients' databases and offers seamless mechanisms to create, store, update and access (query) their databases. This model introduces several re ..."
Abstract - Cited by 143 (8 self) - Add to MetaCart
research issues related to data security. One of the core security requirements is providing efficient mechanisms to ensure data integrity and authenticity while incurring minimal computation and bandwidth overhead. In this work, we investigate the problem of ensuring data integrity and suggest secure

Disk Mirroring with Alternating Deferred Updates

by Christos A. Polyzois, Anupam Bhide, Daniel M. Dias - Proceedings of the Conference on Very Large Data Bases , 1993
"... Mirroring is often used to enhance the reliability of disk systems, but it is usually considered expensive because it duplicates storage cost and increases the cost of writes. Transaction processing applications are often disk arm bound. We show that for such applications mirroring can be used to in ..."
Abstract - Cited by 24 (0 self) - Add to MetaCart
to increase the efficiency of data accesses. The extra disk arms pay for themselves by providing extra bandwidth to the data, so that the cost of the overall system compares favorably with the cost of non-redundant disks. The basic idea is to have the mirrored disks out of phase with one handling reads

Scalable Web Caching of Frequently Updated Objects using Reliable Multicast

by Dan Li, David R. Cheriton , 1999
"... Frequently updated web objects reduce the benefit of caching, increase the problem of cache inconsistency, and aggravate the inefficiency of the conventional "repeated unicast " delivery model. In this paper, we investigate multicast invalidation and delivery of popular, frequently ..."
Abstract - Cited by 36 (0 self) - Add to MetaCart
data as well as the overhead of multicast reliability. Moreover, tracedriven simulations show that the bandwidth saving over conventional approaches increases significantly as the audience size grows. We conclude that MMO provides efficient bandwidth utilization and service scalability, and makes

A Scalable Low-Latency Cache Invalidation Strategy for Mobile Environments

by Guohong Cao - IEEE Trans. Knowledge and Data Eng
"... Caching frequently accessed data items on the client side is an effective technique for improving performance in a mobile environment. Classical cache invalidation strategies are not suitable for mobile environments due to frequent disconnections and mobility of the clients. One attractive cache i ..."
Abstract - Cited by 87 (21 self) - Add to MetaCart
the next IR interval. Second, when the server updates a hot data item, all clients have to query the server and get the data from the server separately, which wastes a large amount of bandwidth. In this paper, we propose an IR-based cache invalidation algorithm, which can significantly reduce the query

An Update on Low Bandwidth X (LBX)

by Standard For, A St, Ard For X, Serial Lines, Jim Fulton, Chris Kent Kantarjiev
"... The question of how to run X applications over telephone lines and other low bandwidth channels has gained much attention recently. In response, the X Consortium is working to define a standard called Low Bandwidth X (LBX) that will allow the X protocol to be transmitted more efficiently over connec ..."
Abstract - Add to MetaCart
The question of how to run X applications over telephone lines and other low bandwidth channels has gained much attention recently. In response, the X Consortium is working to define a standard called Low Bandwidth X (LBX) that will allow the X protocol to be transmitted more efficiently over

Residual Energy Scans for Monitoring Wireless Sensor Networks

by Yonggang Jerry Zhao, Ramesh Govindan, Deborah Estrin - IN PROCEEDINGS OF THE IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE , 2001
"... It is important to have continuously updated information about network resources and application activities after a wireless sensor network is deployed in unpredictable environment. Such information can help notify users of resource depletion or abnormal activities. However, the low user-to-node r ..."
Abstract - Cited by 78 (8 self) - Add to MetaCart
It is important to have continuously updated information about network resources and application activities after a wireless sensor network is deployed in unpredictable environment. Such information can help notify users of resource depletion or abnormal activities. However, the low user

Fast Updates on Read-Optimized Databases Using Multi-Core CPUs

by Jens Krueger, Changkyu Kim, Martin Grund, Nadathur Satish, David Schwalb, Jatin Chhugani, Hasso Plattner, Pradeep Dubey, Er Zeier
"... Read-optimized columnar databases use differential updates to handle writes by maintaining a separate write-optimized delta partition which is periodically merged with the read-optimized and compressed main partition. This merge process introduces significant overheads and unacceptable downtimes in ..."
Abstract - Cited by 19 (9 self) - Add to MetaCart
by a factor of 30. Our linear-time merge algorithm exploits the underlying high compute and bandwidth resources of modern multi-core CPUs with architecture-aware optimizations and efficient parallelization. This enables compressed in-memory column stores to handle the transactional update rate required
Next 10 →
Results 1 - 10 of 343
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University