Sciweavers

828 search results - page 111 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
100
Voted
IPPS
2006
IEEE
15 years 8 months ago
Executing MPI programs on virtual machines in an Internet sharing system
Internet sharing systems aim at federating and utilizing distributed computing resources across the Internet. This paper presents a user-level virtual machine (VM) approach to MPI...
Zhelong Pan, Xiaojuan Ren, Rudolf Eigenmann, Dongy...
113
Voted
HPCA
2003
IEEE
16 years 3 months ago
Tradeoffs in Buffering Memory State for Thread-Level Speculation in Multiprocessors
Thread-level speculation provides architectural support to aggressively run hard-to-analyze code in parallel. As speculative tasks run concurrently, they generate unsafe or specul...
María Jesús Garzarán, Milos P...
142
Voted
PPPJ
2006
ACM
15 years 8 months ago
Enabling Java mobile computing on the IBM Jikes research virtual machine
Today’s complex applications must face the distribution of data and code among different network nodes. Java is a wide-spread language that allows developers to build complex so...
Giacomo Cabri, Letizia Leonardi, Raffaele Quitadam...
142
Voted
MOBICOM
2009
ACM
15 years 9 months ago
Opportunistic flooding in low-duty-cycle wireless sensor networks with unreliable links
Intended for network-wide dissemination of commands, configurations and code binaries, flooding has been investigated extensively in wireless networks. However, little work has ...
Shuo Guo, Yu Gu, Bo Jiang, Tian He
100
Voted
AVSS
2006
IEEE
15 years 8 months ago
Scalable Surveillance Software Architecture
Video surveillance is a key technology for enhanced protection of facilities such as airports and power stations from various types of threat. Networks of thousands of IP-based ca...
Henry Detmold, Anthony R. Dick, Katrina E. Falkner...