Sciweavers

1497 search results - page 214 / 300
» A Computational Model for Message Passing
Sort
View
ACSC
2007
IEEE
14 years 3 days ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...
AINA
2007
IEEE
14 years 3 days ago
Specification Synthesis for Monitoring and Analysis of MANET Protocols
This paper introduces an approach to automatic synthesis of the specification models of routing protocol behavior from the observed flow of the network traffic. In particular, our...
Natalia Stakhanova, Samik Basu, Wensheng Zhang, Xi...
ICCD
2004
IEEE
119views Hardware» more  ICCD 2004»
14 years 5 months ago
An Accurate Combinatorial Model for Performance Prediction of Deterministic Wormhole Routing in Torus Multicomputer Systems
Although several analytical models have been proposed in the literature for different interconnection networks with deterministic routing, very few of them have considered the eff...
Hashem Hashemi Najaf-abadi, Hamid Sarbazi-Azad
HPCC
2010
Springer
13 years 6 months ago
Performance Analysis of Scientific and Engineering Applications Using MPInside and TAU
In this paper, we present performance analysis of two NASA applications using performance tools like Tuning and Analysis Utilities (TAU) and SGI MPInside. MITgcmUV and OVERFLOW ar...
Subhash Saini, Piyush Mehrotra, Kenichi Taylor, Sa...
ISORC
2006
IEEE
14 years 2 months ago
Dynamically Deploying Web Services on a Grid using Dynasoar
Dynasoar is an infrastructure for dynamically deploying Web Services over a Grid or the Internet. It enables an approach to Grid computing in which distributed applications are bu...
Paul Watson, Chris Fowler, Charles Kubicek, Arijit...