Oblivious

Results: 327



#Item
161Models of computation / Analysis of algorithms / Cache-oblivious algorithm / CPU cache / Locality of reference / Parallel computing / Cache / Computer memory / Computing

Cache-Oblivious Simulation of Parallel Programs Andrea Pietracaprina Geppino Pucci Francesco Silvestri

Add to Reading List

Source URL: www.itu.dk

Language: English - Date: 2015-01-07 05:01:28
162XTR / Secure multi-party computation / Alice and Bob / Diffie–Hellman key exchange / Public-key cryptography / PP / X Window System / Commitment scheme / Cryptography / Cryptographic protocols / Oblivious transfer

One-Round Secure Computation and Secure Autonomous Mobile Agents (Extended Abstract) Christian Cachin1 , Jan Camenisch1 , Joe Kilian2 , and Joy M¨ uller1 Abstract. This paper investigates one-round secure computation be

Add to Reading List

Source URL: www.zurich.ibm.com

Language: English - Date: 2000-04-12 11:39:28
163Information / Private information retrieval / Database management systems / Internet protocols / Internet standards / Oblivious transfer / Database / Server / Whois / Cryptographic protocols / Computing / Data

Outsourced Private Information Retrieval ∗ Yizhou Huang

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2013-09-04 10:15:18
164Data / Private information retrieval / Information / Database theory / Whois / Oblivious transfer / Database / Server / Cryptographic protocols / Computing / Database management systems

One (Block) Size Fits All: PIR and SPIR with Variable-Length Records via Multi-Block Queries Ryan Henry, Yizhou Huang, and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo ON, Canada N2L 3

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-12-11 07:56:46
165Analysis of algorithms / Probabilistic complexity theory / Consensus / Randomized algorithm / Time complexity / SL / Iterated logarithm / Theoretical computer science / Computational complexity theory / Applied mathematics

Noname manuscript No. (will be inserted by the editor) Faster Randomized Consensus With an Oblivious Adversary James Aspnes

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2015-04-30 10:34:00
166Data management / B-tree / Linked lists / T-tree / Skip list / Trie / Insertion sort / Priority queue / Cache-oblivious algorithm / Computing / Binary trees / Computer programming

Concurrent Cache-Oblivious B-Trees Michael A. Bender Jeremy T. Fineman Department of Computer Science

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2007-09-28 06:21:01
167Applied mathematics / Cache / Page replacement algorithm / Virtual memory / Randomized algorithm / Fast Fourier transform / Algorithm / Asymptotically optimal algorithm / Cache-oblivious algorithm / Analysis of algorithms / Mathematics / Theoretical computer science

540 Caching with Expiration Times Paxikshit Gopalan" Howard Karlofft

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2002-08-26 13:46:55
168Fault-tolerant computer systems / Computer storage / Non-volatile memory / Data transmission / IOPS / Solid-state drive / Log-structured file system / Standard RAID levels / Nested RAID levels / Computer hardware / Computing / RAID

Gecko: Contention-Oblivious Disk Arrays for Cloud Storage Ji-Yong Shin∗ Mahesh Balakrishnan‡ Tudor Marian† Hakim Weatherspoon∗ ‡ Microsoft Research † Google ∗ Cornell University Abstract

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-05-31 07:14:47
169Numerical linear algebra / Sparse matrices / Nested dissection / Matrix / Cache-oblivious algorithm / Loop nest optimization / Diagonal matrix / Band matrix / Sparse matrix / Algebra / Linear algebra / Mathematics

Hierarchical Diagonal Blocking and Precision Reduction Applied to Combinatorial Multigrid∗ Guy E. Blelloch Ioannis Koutis

Add to Reading List

Source URL: ccom.uprrp.edu

Language: English - Date: 2011-03-02 23:58:23
170Analysis of algorithms / NP-complete problems / Adversary model / Gossip protocol / Clique / Time complexity / Algorithm / Theoretical computer science / Applied mathematics / Computational complexity theory

Gossiping in a Multi-Channel Radio Network An Oblivious Approach to Coping with Malicious Interference (Extended Abstract) Shlomi Dolev1 , Seth Gilbert2 , Rachid Guerraoui3 , and Calvin Newport4 1

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2007-09-28 06:21:17
UPDATE