Sciweavers

1286 search results - page 232 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
SIGCSE
2002
ACM
211views Education» more  SIGCSE 2002»
13 years 7 months ago
To java.net and beyond: teaching networking concepts using the Java networking API
This paper covers the use of Java and its API for developing networking programs in an undergraduate computer networks class. Through the use of TCP and UDP sockets provided in th...
Greg Gagne
HPCA
2006
IEEE
14 years 8 months ago
Completely verifying memory consistency of test program executions
An important means of validating the design of commercial-grade shared memory multiprocessors is to run a large number of pseudo-random test programs on them. However, when intent...
Chaiyasit Manovit, Sudheendra Hangal
ICS
2010
Tsinghua U.
14 years 5 months ago
Proof-Carrying Data and Hearsay Arguments from Signature Cards
: Design of secure systems can often be expressed as ensuring that some property is maintained at every step of a distributed computation among mutually-untrusting parties. Special...
Alessandro Chiesa, Eran Tromer
ICDCS
2009
IEEE
14 years 2 months ago
Stochastic Multicast with Network Coding
The usage of network resources by content providers is commonly governed by Service Level Agreements (SLA) between the content provider and the network service provider. Resource ...
Ajay Gopinathan, Zongpeng Li
CCGRID
2007
IEEE
14 years 1 months ago
Economy-based Content Replication for Peering Content Delivery Networks
: Existing Content Delivery Networks (CDNs) exhibit the nature of closed delivery networks which do not cooperate with other CDNs and in practice, islands of CDNs are formed. The l...
Al-Mukaddim Khan Pathan, Rajkumar Buyya