A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains
[article]
2019
arXiv
pre-print
In particular, by making a natural assumption about the access patterns of SPV clients, we are able to propose a two-tree ORAM construction that overcomes the concurrency limitation associated with traditional ...
Although the simplified payment verification (SPV) clients can address this storage issue, a Bitcoin SPV client has to rely on other Bitcoin nodes to obtain its transaction history and the current approaches ...
Second, by having two ORAM trees, we minimize the downtime of the system by having the writing enclave performed updates on one tree and reading enclave handled clients' requests on the other tree. ...
arXiv:1909.01531v2
fatcat:zmazdiuaovednns6y5elvl6ryi
A Tale of Two Trees: One Writes, and Other Reads
2020
Proceedings on Privacy Enhancing Technologies
In particular, by making a natural assumption about the access patterns of SPV clients, we are able to propose a two-tree ORAM construction that overcomes the concurrency limitation associated with traditional ...
Although the simplified payment verification (SPV) clients can address this storage issue, a Bitcoin SPV client has to rely on other Bitcoin nodes to obtain its transaction history and the current approaches ...
We thank Sajin Sasy for giving us access to the source code of Zerotrace to build a prototype implementation of this system. ...
doi:10.2478/popets-2020-0039
fatcat:ela33e7hyzfobnvcw5uun7xn3m
A tale of two directories
1999
Proceedings of the ACM 1999 conference on Java Grande - JAVA '99
We consider two alternative directory protocols. ...
The home keeps track of the number, status and location of all cached copies of that object. There may be one read/write cached copy, or there may be multiple read-only cached copies. ...
Overall, acquiring exclusive access to an object requires four messages (two blocking). The other cases (e.g., read access) are similar, and we will not dwell on them. ...
doi:10.1145/304065.304107
dblp:conf/java/HerlihyW99
fatcat:rwkxb2o6zna6dfqrg6gnmwpovu
A Tale of Two Rivers
1993
Michigan law review
of milldams and waterwheels can love such a book. ...
Then, in the 1820s they moved north to the Merrimack, embarking on the ambitious project that would eventually become a complex network of dams, canals, and mills at Lowell, . ...
I called this review A Tale of Two Rivers, instead of "Tales" because, in a certain sense, both rivers run through a single tale. It is the same old story about the tragedy of the commons. ...
doi:10.2307/1289783
fatcat:hct6wbrurjbuba7usjf47oqipy
A Tale of Two Faculties
2011
British Journal of Aesthetics
the way in which it interacts with the other 'beauty-making features' of the painting, and with the painting as a whole. 50 As Kant writes, What is most important [is] that the mind does not merely perceive ...
If this reading is correct, one cannot argue, as some have, 96 that the imagination's aesthetic freedom is a failure to apply concepts and laws. ...
doi:10.1093/aesthj/ayr031
fatcat:kqce7rivm5ahlbnqrt4e362jnm
A tale of teaching in two cities
2000
International Nursing Review
Review, 47, 121-125
A tale of teaching in two cities
cures and misconceptions relating to health care. ...
One uses a ‘mefake’ in the morning, a twig from a specific tree; the ‘mefake’ is rubbed around the teeth and often chewed on for a while. ...
doi:10.1046/j.1466-7657.2000.00014.x
pmid:10884181
fatcat:22p34r2rhfhapcwhxxgiglqdde
A Combinatorial Tale of Two Scattering Amplitudes: See Two Bijections
[article]
2022
arXiv
pre-print
The second part tells the tale of the positive Grassmannian and a combinatorial T-duality map on its cells, as related to scattering amplitudes in planar 𝒩 = 4 SYM theory. ...
In particular, T-duality is a bridge between triangulations of the hypersimplex and triangulations of the amplituhedron, two objects that appear as images of the positive Grassmannian. ...
two of the other vertices in the part. ...
arXiv:2206.04749v1
fatcat:e2rs7ksm7fgrpex4qdcevwy6ly
A tale of two voles: A response to Rosenberg 2019
2019
Forest Ecology and Management
of tree voles and red-backed voles. ...
The data that he used to compare the two species are not analogous because they are based on different metrics, biased samples, and different sampling techniques. ...
But one thing seems certain -a comparison of disparate types of data from two species that are as different as red tree voles and red-backed voles is not helpful for informing management decisions that ...
doi:10.1016/j.foreco.2019.03.050
fatcat:2tos2yfbpbefthxw5aqv7kzwhy
A tale of two planners: Modular robotic planning with LDP
2009
2009 IEEE/RSJ International Conference on Intelligent Robots and Systems
However, the metamodule system is more general, and can be implemented on a variety of different MRR designs. ...
In this paper we present the implementation of two motion-planning algorithms in LDP, and analyze both their performance and ease of implementation. ...
CNS-0428738, Intel Labs Pittsburgh, Carnegie Mellon University, and a generous contribution from the Microsoft Corporation. ...
doi:10.1109/iros.2009.5354723
dblp:conf/iros/DeRosaGLPC09
fatcat:jp53npmm7vhdxirgbwnzw2e67q
Branching random walk with infinite progeny mean: a tale of two tails
[article]
2022
arXiv
pre-print
We identify the exact scaling of the maxima in all cases and show the existence of a non-trivial limit when r> 1. ...
We study the extremes of branching random walks under the assumption that the underlying Galton-Watson tree has infinite progeny mean. ...
Infinite progeny mean branching process We shall first recall the main result of [18] on the asymptotic properties of the Galton-Watson tree under the assumption that the progeny mean is infinite. ...
arXiv:1909.08948v4
fatcat:qw3dfzmzijeehejlaa5ocg42le
A Tale Of Two Amplitudes In High Energy Physics
[article]
2013
arXiv
pre-print
We then prove a theorem on permutation sum for a given color ordering, and use it to analyze the boundary behavior of amplitudes with two non-adjacent legs complexified. ...
(abbreviated) I will describe my work on proton Compton scattering in a Unified Proton-Delta theory and on the computation of scattering amplitudes in Yang-Mills theory. ...
This on one hand supports the correctness of our method, and on the other hand a little undermines the value of our method at tree level. ...
arXiv:1305.6227v1
fatcat:jt5sqzpq7feo5koacy53qrfypq
A Tale of Two Ivories: Elephant and Walrus
2017
Espacio, Tiempo y Forma. Serie VII, Historia del Arte
By reading different bodies of research against each other, I propose new avenues for research in the study of medieval art and trade networks. ...
This argument draws upon two ongoing debates, though seemingly unrelated -one about the colonization of Greenland, one about a material known in Arabic as khutū. ...
such a reading. ...
doi:10.5944/etfvii.5.2017.18314
fatcat:dofnbwaqqncvbmaqnqe4lefvle
TwinDNN: A Tale of Two Deep Neural Networks
2021
2021 IEEE 29th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM)
We demonstrate our design on two image classification tasks: CIFAR-10 and ImageNet. ...
The proposed design uses a balanced number of resources available on the hardware and can deliver overall accuracy close to the high accuracy model, but with the inference speed closer to the compressed ...
ACKNOWLEDGMENTS I have received lots of support and assistance throughout my research career and writing this thesis. ...
doi:10.1109/fccm51124.2021.00061
fatcat:fzmui2mcnzen5hc6r3r4iojt5y
A Tale of Two Abstractions: The Case for Object Space
2019
USENIX Workshop on Hot Topics in Storage and File Systems
requires that a diverse set of devices all have the same mappings they need for bulk transfers to and from memory, and that they be able to do so for a potentially heterogeneous memory system. ...
However, software and hardware leverage different abstractions: software operating on persistent data structures requires "global" pointers that remain valid after a process terminates, while hardware ...
Traditionally, a process needs to know ahead of time what its access rights are. Consider the case of a program which operates on a file by reading it and only occasionally writing it. ...
dblp:conf/hotstorage/BittmanALM19
fatcat:ajqn6a2yn5b7bfzwpry6tbj7jy
A tale of two directories: implementing distributed shared objects in Java
2000
Concurrency Practice and Experience
We consider two alternative directory protocols. ...
The home keeps track of the number, status and location of all cached copies of that object. There may be one read/write cached copy, or there may be multiple read-only cached copies. ...
Overall, acquiring exclusive access to an object requires four messages (two blocking). The other cases (e.g., read access) are similar, and we will not dwell on them. ...
doi:10.1002/1096-9128(200005)12:7<555::aid-cpe499>3.0.co;2-o
fatcat:44o4smlir5db5hcyeh6tthsypq
« Previous
Showing results 1 — 15 out of 65,930 results