Sciweavers

1497 search results - page 183 / 300
» A Computational Model for Message Passing
Sort
View
CCS
2010
ACM
14 years 3 months ago
Practical ID-based encryption for wireless sensor network
In this paper, we propose a new practical identity-based encryption scheme which is suitable for wireless sensor network (WSN). We call it Receiver-Bounded Online/Offline Identity...
Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng...
CLUSTER
2009
IEEE
14 years 2 months ago
Reducing network contention with mixed workloads on modern multicore, clusters
Abstract—Multi-core systems are now extremely common in modern clusters. In the past commodity systems may have had up to two or four CPUs per compute node. In modern clusters, t...
Matthew J. Koop, Miao Luo, Dhabaleswar K. Panda
UIST
2003
ACM
14 years 1 months ago
Rhythm modeling, visualizations and applications
People use their awareness of others' temporal patterns to plan work activities and communication. This paper presents algorithms for programatically detecting and modeling t...
James Begole, John C. Tang, Rosco Hill
EDOC
2006
IEEE
14 years 2 months ago
Semi-Automatic Distribution Pattern Modeling of Web Service Compositions using Semantics
Enterprise systems are frequently built by combining a number of discrete Web services together, a process termed composition. There are a number of architectural configurations ...
Ronan Barrett, Claus Pahl
ICAS
2006
IEEE
145views Robotics» more  ICAS 2006»
14 years 2 months ago
A Model-Driven Development Framework for Non-Functional Aspects in Service Oriented Grids
Service-oriented grids are grid computing systems built with the notion of service-oriented architecture (SOA). Using two maract concepts, services and connections between service...
Hiroshi Wada, Junichi Suzuki, Katsuya Oba