Sciweavers

1845 search results - page 317 / 369
» Computing the Angularity Tolerance
Sort
View
CONCURRENCY
2010
110views more  CONCURRENCY 2010»
13 years 10 months ago
Redesigning the message logging model for high performance
Over the past decade the number of processors in the high performance facilities went up to hundreds of thousands. As a direct consequence, while the computational power follow th...
Aurelien Bouteiller, George Bosilca, Jack Dongarra
CN
2008
126views more  CN 2008»
13 years 10 months ago
Graph transformation approaches for diverse routing in shared risk resource group (SRRG) failures
Failure resilience is a desired feature of the Internet. Most traditional restoration architectures assume single-failure assumption, which is not adequate in present day WDM opti...
Pallab Datta, Arun K. Somani
COMCOM
2008
138views more  COMCOM 2008»
13 years 10 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
COMPSEC
2008
138views more  COMPSEC 2008»
13 years 10 months ago
SMSSec: An end-to-end protocol for secure SMS
Short Message Service is usually used to transport unclassified information, but with the rise of mobile commerce it has become an integral tool for conducting business. However S...
Johnny Li-Chang Lo, Judith Bishop, Jan H. P. Eloff
FSS
2008
113views more  FSS 2008»
13 years 10 months ago
Consistency measure, inclusion degree and fuzzy measure in decision tables
Classical consistency degree has some limitations for measuring the consistency of a decision table, in which the lower approximation of a target decision is only taken into consi...
Yuhua Qian, Jiye Liang, Chuangyin Dang