Sciweavers

6756 search results - page 1263 / 1352
» Distributed Shared State
Sort
View
135
Voted
SASN
2006
ACM
15 years 8 months ago
Location-aware key predistribution scheme for wide area wireless sensor networks
Key predistribution in wireless sensor networks refers to the problem of distributing secret keys among sensors prior to deployment. Solutions appeared in the literature can be cl...
Katerina Simonova, Alan C. H. Ling, Xiaoyang Sean ...
119
Voted
SIGUCCS
2006
ACM
15 years 8 months ago
Because we have better things to do: automating common support tasks
As technology permeates more aspects of our everyday lives, greater demands are placed on information technology personnel. Lehigh University computing consultants have found thei...
Keith B. Erekson, Stephen G. Lewis
124
Voted
CCGRID
2005
IEEE
15 years 8 months ago
Mapping DAG-based applications to multiclusters with background workload
Before an application modelled as a Directed Acyclic Graph (DAG) is executed on a heterogeneous system, a DAG mapping policy is often enacted. After mapping, the tasks (in the DAG...
Ligang He, Stephen A. Jarvis, Daniel P. Spooner, D...
159
Voted
CLUSTER
2005
IEEE
15 years 8 months ago
Memory Management Support for Multi-Programmed Remote Direct Memory Access (RDMA) Systems
Current operating systems offer basic support for network interface controllers (NICs) supporting remote direct memory access (RDMA). Such support typically consists of a device d...
Kostas Magoutis
110
Voted
HICSS
2005
IEEE
170views Biometrics» more  HICSS 2005»
15 years 8 months ago
Low-Bandwidth Topology Maintenance for Robustness in Structured Overlay Networks
— Structured peer-to-peer systems have emerged as infrastructures for resource sharing in large-scale, distributed, and dynamic environments. One challenge in these systems is to...
Ali Ghodsi, Luc Onana Alima, Seif Haridi
« Prev « First page 1263 / 1352 Last » Next »