Sciweavers

1338 search results - page 179 / 268
» A Secure Communications Infrastructure for High-Performance ...
Sort
View
TGC
2005
Springer
15 years 8 months ago
Types for Security in a Mobile World
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acade...
Adriana B. Compagnoni, Elsa L. Gunter
ICDCS
1998
IEEE
15 years 6 months ago
Structuring Remote Object Systems for Mobile Hosts with Intermittent Connectivity
In distributed object systems, remote method inattempts to abstract communication between di erent machines to the level of object method invocation. Link failure in such systems ...
Girish Welling, Maximilian Ott
IPPS
2009
IEEE
15 years 9 months ago
Annotation-based empirical performance tuning using Orio
In many scientific applications, significant time is spent tuning codes for a particular highperformance architecture. Tuning approaches range from the relatively nonintrusive (...
Albert Hartono, Boyana Norris, Ponnuswamy Sadayapp...
139
Voted
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 8 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
SASN
2006
ACM
15 years 8 months ago
Attack-resilient hierarchical data aggregation in sensor networks
In a large sensor network, in-network data aggregation, i.e., combining partial results at intermediate nodes during message routing, significantly reduces the amount of communic...
Sankardas Roy, Sanjeev Setia, Sushil Jajodia