Sciweavers

3972 search results - page 700 / 795
» Design of the iSCSI Protocol
Sort
View
USENIX
2008
14 years 14 days ago
Perspectives:  Improving SSH-style Host Authentication with Multi-Path Probing
The popularity of "Trust-on-first-use" (Tofu) authentication, used by SSH and HTTPS with self-signed certificates, demonstrates significant demand for host authenticatio...
Dan Wendlandt, David G. Andersen, Adrian Perrig
CISS
2008
IEEE
14 years 4 days ago
Cross-layer multicommodity capacity expansion on ad hoc wireless networks of cognitive radios
Cognitive radios permit dynamic control of physical layer resources such as transmission power and constellation size; these degrees of freedom can be employed to achieve significa...
Alex Fridman, Steven Weber, Kapil R. Dandekar, Mos...
DIALM
2005
ACM
203views Algorithms» more  DIALM 2005»
14 years 3 days ago
Topological hole detection in wireless sensor networks and its applications
The identification of holes in a wireless sensor network is of primary interest since the breakdown of sensor nodes in a larger area often indicates one of the special events to ...
Stefan Funke
DATE
2008
IEEE
163views Hardware» more  DATE 2008»
13 years 12 months ago
A Simulation Methodology for Worst-Case Response Time Estimation of Distributed Real-Time Systems
In this paper, we propose a simulation-based methodology for worst-case response time estimation of distributed realtime systems. Schedulability analysis produces pessimistic uppe...
Soheil Samii, Sergiu Rafiliu, Petru Eles, Zebo Pen...
EUROPAR
2008
Springer
13 years 12 months ago
Reducing Kernel Development Complexity in Distributed Environments
Setting up generic and fully transparent distributed services for clusters implies complex and tedious kernel developments. More flexible approaches such as user-space libraries ar...
Adrien Lebre, Renaud Lottiaux, Erich Focht, Christ...