Sciweavers

832 search results - page 14 / 167
» Effect of Malicious Synchronization
Sort
View
JCM
2008
73views more  JCM 2008»
13 years 9 months ago
Secure and Distributed P2P Reputation Management
The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats for the development of distributed computing technology. One feasible way...
Jianli Hu, Quanyuan Wu, Bin Zhou
CLUSTER
2008
IEEE
13 years 10 months ago
Benchmarking the effects of operating system interference on extreme-scale parallel machines
We investigate operating system noise, which we identify as one of the main reasons for a lack of synchronicity in parallel applications. Using a microbenchmark, we measure the no...
Peter H. Beckman, Kamil Iskra, Kazutomo Yoshii, Su...
PODC
2009
ACM
14 years 7 months ago
The wireless synchronization problem
In this paper, we study the wireless synchronization problem which requires devices activated at different times on a congested single-hop radio network to synchronize their roun...
Shlomi Dolev, Seth Gilbert, Rachid Guerraoui, Fabi...
DATE
2006
IEEE
99views Hardware» more  DATE 2006»
14 years 3 months ago
Parallel co-simulation using virtual synchronization with redundant host execution
In traditional parallel co-simulation approaches, the simulation speed is heavily limited by time synchronization overhead between simulators and idle time caused by data dependen...
Dohyung Kim, Soonhoi Ha, Rajesh Gupta
WDAG
2001
Springer
76views Algorithms» more  WDAG 2001»
14 years 2 months ago
An Effective Characterization of Computability in Anonymous Networks
We provide effective (i.e., recursive) characterizations of the relations that can be computed on networks where all processors use the same algorithm, start from the same state, a...
Paolo Boldi, Sebastiano Vigna