Results 1 - 10
of
343
1Energy and Bandwidth-Efficient Key Distribution in Wireless Ad-Hoc Networks: A Cross-Layer Approach
"... Abstract — We address the problem of resource-efficient access control for group communications in wireless ad-hoc networks. Restricting the access to group data can be reduced to the problem of securely distributing cryptographic keys to group members, known as the key distribution problem (KDP). W ..."
Abstract
- Add to MetaCart
efficiency of multicasting, and establish an analytical worst-case bound for it. Finally, we propose On-line VP3 which dynamically updates the key assignment structure according to the dynamics of the communication group in a resource-efficient way. Index Terms — key distribution, secure group communication
On Path Selection for Traffic with Bandwidth Guarantees
- In Proceedings of IEEE International Conference on Network Protocols
, 1997
"... Transmission of multimedia streams imposesa minimum-bandwidth requirementon the path being used to ensureend-to-end Quality-ofService (QoS) guarantees. While any shortest-path algorithm can be used to select a feasible path, additional constraints that limit resource consumption and balance the netw ..."
Abstract
-
Cited by 190 (7 self)
- Add to MetaCart
to requests for different bandwidths, robustness to inaccurate routing information, and sensitivity to the routing information update frequency. It evaluates not only the performance of these algorithms for the sessions with bandwidth guarantees, but also their impact on the lower priority best
Practical Off-chip Meta-data for Temporal Memory Streaming
"... Prior research demonstrates that temporal memory streaming and related address-correlating prefetchers improve performance of commercial server workloads though increased memory level parallelism. Unfortunately, these prefetchers require large on-chip meta-data storage, making previously-proposed de ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
-data off chip: minimal off-chip lookup latency, bandwidthefficient meta-data updates, and off-chip lookup amortized over many prefetches. In this work, we show: (1) minimal off-chip meta-data lookup latency can be achieved through a hardware-managed main memory hash table, (2) bandwidth-efficient updates
Authentication and Integrity in Outsourced Databases
, 2004
"... In the Outsourced Database (ODB) model, organizations outsource their data management needs to an external service provider. The service provider hosts clients' databases and offers seamless mechanisms to create, store, update and access (query) their databases. This model introduces several re ..."
Abstract
-
Cited by 143 (8 self)
- Add to MetaCart
research issues related to data security. One of the core security requirements is providing efficient mechanisms to ensure data integrity and authenticity while incurring minimal computation and bandwidth overhead. In this work, we investigate the problem of ensuring data integrity and suggest secure
Disk Mirroring with Alternating Deferred Updates
- Proceedings of the Conference on Very Large Data Bases
, 1993
"... Mirroring is often used to enhance the reliability of disk systems, but it is usually considered expensive because it duplicates storage cost and increases the cost of writes. Transaction processing applications are often disk arm bound. We show that for such applications mirroring can be used to in ..."
Abstract
-
Cited by 24 (0 self)
- Add to MetaCart
to increase the efficiency of data accesses. The extra disk arms pay for themselves by providing extra bandwidth to the data, so that the cost of the overall system compares favorably with the cost of non-redundant disks. The basic idea is to have the mirrored disks out of phase with one handling reads
Scalable Web Caching of Frequently Updated Objects using Reliable Multicast
, 1999
"... Frequently updated web objects reduce the benefit of caching, increase the problem of cache inconsistency, and aggravate the inefficiency of the conventional "repeated unicast " delivery model. In this paper, we investigate multicast invalidation and delivery of popular, frequently ..."
Abstract
-
Cited by 36 (0 self)
- Add to MetaCart
data as well as the overhead of multicast reliability. Moreover, tracedriven simulations show that the bandwidth saving over conventional approaches increases significantly as the audience size grows. We conclude that MMO provides efficient bandwidth utilization and service scalability, and makes
A Scalable Low-Latency Cache Invalidation Strategy for Mobile Environments
- IEEE Trans. Knowledge and Data Eng
"... Caching frequently accessed data items on the client side is an effective technique for improving performance in a mobile environment. Classical cache invalidation strategies are not suitable for mobile environments due to frequent disconnections and mobility of the clients. One attractive cache i ..."
Abstract
-
Cited by 87 (21 self)
- Add to MetaCart
the next IR interval. Second, when the server updates a hot data item, all clients have to query the server and get the data from the server separately, which wastes a large amount of bandwidth. In this paper, we propose an IR-based cache invalidation algorithm, which can significantly reduce the query
An Update on Low Bandwidth X (LBX)
"... The question of how to run X applications over telephone lines and other low bandwidth channels has gained much attention recently. In response, the X Consortium is working to define a standard called Low Bandwidth X (LBX) that will allow the X protocol to be transmitted more efficiently over connec ..."
Abstract
- Add to MetaCart
The question of how to run X applications over telephone lines and other low bandwidth channels has gained much attention recently. In response, the X Consortium is working to define a standard called Low Bandwidth X (LBX) that will allow the X protocol to be transmitted more efficiently over
Residual Energy Scans for Monitoring Wireless Sensor Networks
- IN PROCEEDINGS OF THE IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE
, 2001
"... It is important to have continuously updated information about network resources and application activities after a wireless sensor network is deployed in unpredictable environment. Such information can help notify users of resource depletion or abnormal activities. However, the low user-to-node r ..."
Abstract
-
Cited by 78 (8 self)
- Add to MetaCart
It is important to have continuously updated information about network resources and application activities after a wireless sensor network is deployed in unpredictable environment. Such information can help notify users of resource depletion or abnormal activities. However, the low user
Fast Updates on Read-Optimized Databases Using Multi-Core CPUs
"... Read-optimized columnar databases use differential updates to handle writes by maintaining a separate write-optimized delta partition which is periodically merged with the read-optimized and compressed main partition. This merge process introduces significant overheads and unacceptable downtimes in ..."
Abstract
-
Cited by 19 (9 self)
- Add to MetaCart
by a factor of 30. Our linear-time merge algorithm exploits the underlying high compute and bandwidth resources of modern multi-core CPUs with architecture-aware optimizations and efficient parallelization. This enables compressed in-memory column stores to handle the transactional update rate required
Results 1 - 10
of
343