Zum Hauptinhalt springen

Showing 1–3 of 3 results for author: Gorbunov, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2105.01160  [pdf, other

    cs.LG hep-ex

    The Tracking Machine Learning challenge : Throughput phase

    Authors: Sabrina Amrouche, Laurent Basara, Paolo Calafiura, Dmitry Emeliyanov, Victor Estrade, Steven Farrell, Cécile Germain, Vladimir Vava Gligorov, Tobias Golling, Sergey Gorbunov, Heather Gray, Isabelle Guyon, Mikhail Hushchyn, Vincenzo Innocente, Moritz Kiehn, Marcel Kunze, Edward Moyse, David Rousseau, Andreas Salzburger, Andrey Ustyuzhanin, Jean-Roch Vlimant

    Abstract: This paper reports on the second "Throughput" phase of the Tracking Machine Learning (TrackML) challenge on the Codalab platform. As in the first "Accuracy" phase, the participants had to solve a difficult experimental problem linked to tracking accurately the trajectory of particles as e.g. created at the Large Hadron Collider (LHC): given O($10^5$) points, the participants had to connect them in… ▽ More

    Submitted 14 May, 2021; v1 submitted 3 May, 2021; originally announced May 2021.

    Comments: submitted to Computing and Software for Big Science

  2. arXiv:1810.09300  [pdf, other

    cs.DC cs.NI cs.PF

    RCanopus: Making Canopus Resilient to Failures and Byzantine Faults

    Authors: S. Keshav, W. Golab, B. Wong, S. Rizvi, S. Gorbunov

    Abstract: Distributed consensus is a key enabler for many distributed systems including distributed databases and blockchains. Canopus is a scalable distributed consensus protocol that ensures that live nodes in a system agree on an ordered sequence of operations (called transactions). Unlike most prior consensus protocols, Canopus does not rely on a single leader. Instead, it uses a virtual tree overlay fo… ▽ More

    Submitted 16 June, 2019; v1 submitted 22 October, 2018; originally announced October 2018.

    Comments: Pre-print

  3. arXiv:1711.02279  [pdf, other

    cs.CR

    StealthDB: a Scalable Encrypted Database with Full SQL Query Support

    Authors: Alexey Gribov, Dhinakaran Vinayagamurthy, Sergey Gorbunov

    Abstract: Encrypted database systems provide a great method for protecting sensitive data in untrusted infrastructures. These systems are built using either special-purpose cryptographic algorithms that support operations over encrypted data, or by leveraging trusted computing co-processors. Strong cryptographic algorithms (e.g., public-key encryptions, garbled circuits) usually result in high performance o… ▽ More

    Submitted 21 April, 2019; v1 submitted 6 November, 2017; originally announced November 2017.