Sciweavers

303 search results - page 11 / 61
» A Low-Latency Checkpointing Scheme for Mobile Computing Syst...
Sort
View
ICDCSW
2008
IEEE
14 years 1 months ago
A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems
Zhong Xu, Xue Liu, Guoqing Zhang, Wenbo He, Guanzh...
ACSC
2005
IEEE
14 years 10 days ago
A File Discovery Control Scheme for P2P File Sharing Applications in Wireless Mobile Environments
The mobility characteristic brings new challenges for research of P2P computing over the wireless mobile networking environment. Peers’ movements in wireless mobile network chan...
Chung-Ming Huang, Tz-Heng Hsu, Ming-Fa Hsu
NSDI
2004
13 years 8 months ago
Efficient Routing for Peer-to-Peer Overlays
Most current peer-to-peer lookup schemes keep a small amount of routing state per node, typically logarithmic in the number of overlay nodes. This design assumes that routing info...
Anjali Gupta, Barbara Liskov, Rodrigo Rodrigues
IPPS
2007
IEEE
14 years 1 months ago
Improving MPI Independent Write Performance Using A Two-Stage Write-Behind Buffering Method
Many large-scale production applications often have very long executions times and require periodic data checkpoints in order to save the state of the computation for program rest...
Wei-keng Liao, Avery Ching, Kenin Coloma, Alok N. ...
IJNSEC
2006
85views more  IJNSEC 2006»
13 years 6 months ago
A Forgery Attack on A Low Computation Cost User Authentication Scheme
In 2005, Lee-Lin-Chang proposed a low computation cost user authentication scheme for mobile communication. However, the current paper demonstrates the vulnerability of Lee-Lin-Ch...
Eun-Jun Yoon, Kee-Young Yoo