Sciweavers

7853 search results - page 1491 / 1571
» Learning from Each Other
Sort
View
CLUSTER
2009
IEEE
14 years 3 months ago
Reducing network contention with mixed workloads on modern multicore, clusters
Abstract—Multi-core systems are now extremely common in modern clusters. In the past commodity systems may have had up to two or four CPUs per compute node. In modern clusters, t...
Matthew J. Koop, Miao Luo, Dhabaleswar K. Panda
GLOBECOM
2009
IEEE
14 years 3 months ago
Distributed Target Tracking with Directional Binary Sensor Networks
—One of the most common and important applications of wireless sensor networks is target tracking. We study it in its most basic form, assuming the binary sensing model in which ...
Zijian Wang, Eyuphan Bulut, Boleslaw K. Szymanski
INFOCOM
2009
IEEE
14 years 3 months ago
Estimating Hop Distance Between Arbitrary Host Pairs
—Establishing a clear and timely picture of Internet topology is complicated by many factors including the vast size and dynamic nature of the infrastructure. In this paper, we d...
Brian Eriksson, Paul Barford, Robert D. Nowak
ASMTA
2009
Springer
104views Mathematics» more  ASMTA 2009»
14 years 3 months ago
Preliminary Results on a Simple Approach to G/G/c-Like Queues
In this paper we consider a multi-server queue with a near general arrival process (represented as an arbitrary state-dependent Coxian distribution), a near general state-dependent...
Alexandre Brandwajn, Thomas Begin
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
14 years 3 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev
« Prev « First page 1491 / 1571 Last » Next »