Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2023
SOLA: A Decentralized Communication Middleware Developed with ns-3
- Peter Detzner,
- Jana Gödeke,
- Lars Tönning,
- Patrick Laskowski,
- Maximilian Hörstrup,
- Oliver Stolz,
- Marius Brehler,
- Sören Kerner
WNS3 '23: Proceedings of the 2023 Workshop on ns-3Pages 78–85https://doi.org/10.1145/3592149.3592151The transformation from static production facilities into a flexible and decentralized cyber-physical production system (CPPS) is part of the current ongoing Industry 4.0. A CPPS will enable and support communication between people, machines and virtual ...
- research-articleJune 2023
Tree-structured Overlays with Minimal Height: Construction, Maintenance and Operation
DEBS '23: Proceedings of the 17th ACM International Conference on Distributed and Event-based SystemsPages 168–176https://doi.org/10.1145/3583678.3596894Distributed systems, potentially growing large and consisting of heterogeneous nodes, are advised to be constructed following the Peer-to-Peer (P2P) networking paradigm. It becomes imperative that a Peer-to-Peer (P2P) network is paired with efficient ...
- research-articleJanuary 2022
On the Maximum Agreement Subtree Conjecture for Balanced Trees
SIAM Journal on Discrete Mathematics (SIDMA), Volume 36, Issue 1Pages 336–354https://doi.org/10.1137/20M1379678We give a counterexample to the conjecture of Martin and Thatte that two balanced rooted binary leaf-labeled trees on $n$ leaves have a maximum agreement subtree (MAST) of size at least $n^{\frac{1}{2}}$. In particular, we show that for any $c>0$, there ...
- tutorialFebruary 2019
Implementing parallel and concurrent tree structures
PPoPP '19: Proceedings of the 24th Symposium on Principles and Practice of Parallel ProgrammingPages 447–450https://doi.org/10.1145/3293883.3302576As one of the most important data structures used in algorithm design and programming, balanced search trees are widely used in real-world applications for organizing data. Answering the challenges thrown up by modern large-volume and ever-changing data,...
- research-articleFebruary 2016
Efficient Dynamic Provable Possession of Remote Data via Update Trees
ACM Transactions on Storage (TOS), Volume 12, Issue 2Article No.: 9, Pages 1–45https://doi.org/10.1145/2747877The emergence and wide availability of remote storage service providers prompted work in the security community that allows clients to verify integrity and availability of the data that they outsourced to a not fully trusted remote storage server at a ...
- articleMay 2012
Balanced key tree management for multi-privileged groups using (N, T) policy
Security and Communication Networks (SACN), Volume 5, Issue 5Pages 545–555https://doi.org/10.1002/sec.351Many internet applications are based on group communication model. For secure group communication scenario, key management is an important issue. In a hierarchical architecture, key trees are used. When users join or leave a key tree, all the ancestor ...
- articleOctober 2011
Non-split balancing higher order tree for multi-privileged groups
In group communication scenario, key management is important to preserve forward and backward secrecy. In order to achieve it keys need to be changed during user join/leave which is done by an operation called rekeying. In a centralized key management ...
- research-articleSeptember 2011
Balanced trees inhabiting functional parallel programming
ICFP '11: Proceedings of the 16th ACM SIGPLAN international conference on Functional programmingPages 117–128https://doi.org/10.1145/2034773.2034791Divide-and-conquer is an important technique in parallel programming. However, algebraic data structures do not fit divide-and-conquer parallelism. For example, the usual pointer-based implementation of lists cannot efficiently be divided at their ...
Also Published in:
ACM SIGPLAN Notices: Volume 46 Issue 9 - articleSeptember 2009
Three different designs for packet classification
WSEAS Transactions on Computers (WSTOCMP), Volume 8, Issue 9Pages 1494–1503If we analyze real life filter sets (classifiers) and also packet classification requirements, it seems that distribution of rule scope is non-uniform and in some sub spaces is denser inside the total space of classifiers. These features guided us to ...
- ArticleJuly 2009
Balanced HiCuts: an optimized packet classification algorithm
The ability to classify each incoming packet is called packet classification and is based on an arbitrary number of packet header fields. The role of packet classification is important in special services such as VPNs, firewalls and differentiated ...
- ArticleMarch 2009
Parallel Load Balancing Strategies for Tree-Structured Peer-to-Peer Networks
APWeb/WAIM '09: Proceedings of the Joint International Conferences on Advances in Data and Web ManagementPages 468–479https://doi.org/10.1007/978-3-642-00672-2_41A logical balanced tree structure can be overlaid on a peer-to-peer (P2P) network to support both exact match and range queries. Load balancing mechanisms are needed for handling skew problems in a tree-structured network. Traditional load balancing ...
- research-articleFebruary 2005
A Novel High-Order Tree for Secure Multicast Key Management
IEEE Transactions on Computers (ITCO), Volume 54, Issue 2Pages 214–224https://doi.org/10.1109/TC.2005.15Multicast is used to deliver packets to a group of users. To prevent users outside the group from eavesdropping, a group key is maintained to encrypt the group communication, and the group key is changed (rekeying) when a new member joins the group or ...