scholarly journals Coded Gradient Aggregation: A Tradeoff Between Communication Costs at Edge Nodes and at Helper Nodes

Author(s):  
Birenjith Sasidharan ◽  
Anoop Thomas
Keyword(s):  
BMJ ◽  
2020 ◽  
pp. m4383 ◽  
Author(s):  
Helen Salisbury
Keyword(s):  

2001 ◽  
Vol 02 (03) ◽  
pp. 317-329 ◽  
Author(s):  
MUSTAFA MAT DERIS ◽  
ALI MAMAT ◽  
PUA CHAI SENG ◽  
MOHD YAZID SAMAN

This article addresses the performance of data replication protocol in terms of data availability and communication costs. Specifically, we present a new protocol called Three Dimensional Grid Structure (TDGS) protocol, to manage data replication in distributed system. The protocol provides high availability for read and write operations with limited fault-tolerance at low communication cost. With TDGS protocol, a read operation is limited to two data copies, while a write operation is required with minimal number of copies. In comparison to other protocols. TDGS requires lower communication cost for an operation, while providing higher data availability.


bit-Tech ◽  
2018 ◽  
Vol 1 (1) ◽  
pp. 1-8
Author(s):  
Riki Riki ◽  
Aditiya Hermawan ◽  
Yusuf Kurnia

TCP\IP protocol can be connected to various computer data networks in the world. This protocol increasingly exists and is needed so that many parties develop it to vote through this protocol. Voice Over Internet Protocol technology is the answer to that desire. This technology is able to convert analog voice (human voice) into data packets then through public internet data networks and private intranet data packets are passed, so that communication can occur. With VoIP communication costs can be reduced so that it can reduce investment costs and conversations (cost saving) or even up to 100% free. VoIP implementation can be done by designing a wireless VoIP network (cable) using 3CXSystemPhone software as a PBX. In this scientific work the software used is 3CXSystemPhone 11.0, where SIP is a VoIP server which is a freeware software, in its application only requires one PC server and several PC clients (2 for example) that are connected to each other


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Xiaopeng Yang ◽  
Hui Zhu ◽  
Songnian Zhang ◽  
Rongxing Lu ◽  
Xuesong Gao

Biometric identification services have been applied to almost all aspects of life. However, how to securely and efficiently identify an individual in a huge biometric dataset is still very challenging. For one thing, biometric data is very sensitive and should be kept secure during the process of biometric identification. On the other hand, searching a biometric template in a large dataset can be very time-consuming, especially when some privacy-preserving measures are adopted. To address this problem, we propose an efficient and privacy-preserving biometric identification scheme based on the FITing-tree, iDistance, and a symmetric homomorphic encryption (SHE) scheme with two cloud servers. With our proposed scheme, the privacy of the user’s identification request and service provider’s dataset is guaranteed, while the computational costs of the cloud servers in searching the biometric dataset can be kept at an acceptable level. Detailed security analysis shows that the privacy of both the biometric dataset and biometric identification request is well protected during the identification service. In addition, we implement our proposed scheme and compare it to a previously reported M-Tree based privacy-preserving identification scheme in terms of computational and communication costs. Experimental results demonstrate that our proposed scheme is indeed efficient in terms of computational and communication costs while identifying a biometric template in a large dataset.


Complexity ◽  
2009 ◽  
Vol 15 (2) ◽  
pp. 54-63 ◽  
Author(s):  
Gani Aldashev ◽  
Timoteo Carletti

2015 ◽  
Vol 92 ◽  
pp. 28-40 ◽  
Author(s):  
Jonas Hedlund
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document