Sciweavers

2112 search results - page 368 / 423
» Communication networks in geographically distributed softwar...
Sort
View
SIGCOMM
2012
ACM
13 years 6 months ago
Finishing flows quickly with preemptive scheduling
Today’s data centers face extreme challenges in providing low latency. However, fair sharing, a principle commonly adopted in current congestion control protocols, is far from o...
Chi-Yao Hong, Matthew Caesar, Brighten Godfrey
FM
2009
Springer
138views Formal Methods» more  FM 2009»
15 years 11 months ago
What Can Formal Methods Bring to Systems Biology?
This position paper argues that the operational modelling approaches from the formal methods community can be applied fruitfully within the systems biology domain. The results can ...
Nicola Bonzanni, K. Anton Feenstra, Wan Fokkink, E...
MOBISYS
2009
ACM
16 years 4 months ago
BlueMonarch: a system for evaluating bluetooth applications in the wild
Despite Bluetooth's popularity, low cost, and low power requirements, Bluetooth applications remain remarkably unsophisticated. Although the research community and industry h...
Timothy J. Smith, Stefan Saroiu, Alec Wolman
IJISEC
2007
119views more  IJISEC 2007»
15 years 4 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny
TCC
2009
Springer
132views Cryptology» more  TCC 2009»
16 years 4 months ago
Authenticated Adversarial Routing
: The aim of this paper is to demonstrate the feasibility of authenticated throughput-ecient routing in an unreliable and dynamically changing synchronous network in which the majo...
Yair Amir, Paul Bunn, Rafail Ostrovsky