Sciweavers

828 search results - page 56 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
137
Voted
DSOM
2000
Springer
15 years 7 months ago
Evaluation of Constrained Mobility for Programmability in Network Management
In recent years, a significant amount of research work has addressed the use of code mobility in network management. In this paper, we introduce first three aspects of code mobilit...
Christos Bohoris, Antonio Liotta, George Pavlou
107
Voted
MKM
2004
Springer
15 years 8 months ago
An Architecture for Distributed Mathematical Web Services
This paper describes technologies to create and maintain a problem solving environment based on a framework for distributed mathematical web services. Our approach allows clients t...
Elena S. Smirnova, Clare M. So, Stephen M. Watt
142
Voted
CODASPY
2012
13 years 10 months ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...
98
Voted
INFOCOM
2009
IEEE
15 years 9 months ago
LayerP2P: A New Data Scheduling Approach for Layered Streaming in Heterogeneous Networks
—Although layered streaming in heterogeneous peer-to-peer networks has drawn great interest in recent years, there’s still a lack of systematical studies on its data scheduling...
Xin Xiao, Yuanchun Shi, Yuan Gao, Qian Zhang
113
Voted
IPPS
2007
IEEE
15 years 9 months ago
Tera-scalable Fourier Spectral Element Code for DNS of Channel Turbulent Flow at High Reynolds Number
Due to the extensive requirement of memory and speed for direct numerical simulation (DNS) of channel turbulence, people can only perform DNS at moderate Reynolds number before. W...
Jin Xu