Sciweavers

4305 search results - page 290 / 861
» Analysing Protocol Implementations
Sort
View
105
Voted
ISPDC
2006
IEEE
15 years 8 months ago
How to Achieve High Throughput with Dynamic Tree-Structured Coterie
Data replication permits a better network bandwidth utilization and minimizes the effect of latency in large-scale systems such as computing grids. However, the cost of maintainin...
Ivan Frain, Abdelaziz Mzoughi, Jean Paul Bahsoun
119
Voted
DEXAW
2005
IEEE
117views Database» more  DEXAW 2005»
15 years 8 months ago
Wide-Area Replication Support for Global Data Repositories
Wide-area replication improves the availability and performance of globally distributed data repositories. Protocols needed for maintaining replication consistency may cause an un...
Hendrik Decker, Luis Irún-Briz, Rubé...
127
Voted
EUROPAR
2005
Springer
15 years 8 months ago
MADIS: A Slim Middleware for Database Replication
Availability and performance can be improved using data replication as the basic technique, thus benefitting the services provided by a distributed system. However, replication im...
Luis Irún-Briz, Hendrik Decker, Rubé...
MATA
2005
Springer
155views Communications» more  MATA 2005»
15 years 8 months ago
Web Agent Supporting Transport Layer Mobility
Typical transmission control protocol (TCP) based web agents in mobile wireless environment have several deficiencies, such as performance degradation, head-of-line blocking, and u...
Yong-Jin Lee, Mohammed Atiquzzaman
RTA
2005
Springer
15 years 8 months ago
Intruder Deduction for AC-Like Equational Theories with Homomorphisms
Cryptographic protocols are small programs which involve a high level of concurrency and which are difficult to analyze by hand. The most successful methods to verify such protocol...
Pascal Lafourcade, Denis Lugiez, Ralf Treinen