Sciweavers

448 search results - page 31 / 90
» Implementation and Performance Evaluation of the re-ECN Prot...
Sort
View
JAMIA
2011
68views more  JAMIA 2011»
12 years 10 months ago
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance
Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality h...
Khaled El Emam, Jun Hu, Jay Mercer, Liam Peyton, M...
HPCA
2000
IEEE
14 years 16 hour ago
Improving the Throughput of Synchronization by Insertion of Delays
Efficiency of synchronization mechanisms can limit the parallel performance of many shared-memory applications. In addition, the ever increasing performance gap between processor...
Ravi Rajwar, Alain Kägi, James R. Goodman
TSE
1998
112views more  TSE 1998»
13 years 7 months ago
Message Logging: Pessimistic, Optimistic, Causal, and Optimal
Message-logging protocols are an integral part of a popular technique for implementing processes that can recover from crash failures. All message-logging protocols require that, ...
Lorenzo Alvisi, Keith Marzullo
ICDCSW
2011
IEEE
12 years 7 months ago
SenSec: A Scalable and Accurate Framework for Wireless Sensor Network Security Evaluation
—Developing secure wireless sensor networks (WSNs) is a complex process that involves careful design of attack test cases and security countermeasures, as well as meaningful eval...
Yi-Tao Wang, Rajive Bagrodia
ICAS
2008
IEEE
197views Robotics» more  ICAS 2008»
14 years 2 months ago
A Distributed and Autonomic Virtual Network Mapping Framework
This paper addresses the challenge of assigning virtual networks, through network virtualisation, to the underlying physical network in a distributed and efficient manner. The pa...
Ines Houidi, Wajdi Louati, Djamal Zeghlache