Sciweavers

598 search results - page 100 / 120
» A Deterministic Metaheuristic Approach Using
Sort
View
MIDDLEWARE
2007
Springer
14 years 1 months ago
New Worker-Centric Scheduling Strategies for Data-Intensive Grid Applications
Distributed computations, dealing with large amounts of data, are scheduled in Grid clusters today using either a task-centric mechanism, or a worker-centric mechanism. Because of ...
Steven Y. Ko, Ramsés Morales, Indranil Gupt...
EDCC
2005
Springer
14 years 1 months ago
Gracefully Degrading Fair Exchange with Security Modules
The fair exchange problem is key to trading electronic items in systems of mutually untrusted parties. In modern variants of such systems, each party is equipped with a security mo...
Gildas Avoine, Felix C. Gärtner, Rachid Guerr...
ICPP
2003
IEEE
14 years 1 months ago
Effective Real-time Anycast Flow Connection Algorithm and Delay Analysis
Define anycast services as a group of replicated servers that may provide similar or identical services. Using anycast services can significantly simplify some applications such...
Weijia Jia, Chuanlin Zhang, Lidong Lin, Wanqing Tu...
CL
2000
Springer
14 years 2 days ago
The Taming of the (X)OR
Abstract. Many key verification problems such as boundedmodel-checking,circuit verification and logical cryptanalysis are formalized with combined clausal and affine logic (i.e....
Peter Baumgartner, Fabio Massacci
ICC
2007
IEEE
136views Communications» more  ICC 2007»
13 years 11 months ago
SAMcast - A Scalable, Secure and Authenticated Multicast Protocol for Large Scale P2P Networks
Overlay networks have shown tremendous potential in solving large scale data dissemination problem by employing peer-to-peer communication protocols. These networks, however, have ...
Waseem Ahmad, Ashfaq A. Khokhar