Sciweavers

7891 search results - page 1365 / 1579
» Local Area Networking
Sort
View
104
Voted
IPPS
2000
IEEE
15 years 6 months ago
Self-Stabilizing Mutual Exclusion Using Unfair Distributed Scheduler
A self-stabilizing algorithm, regardless of the initial system state, converges in finite time to a set of states that satisfy a legitimacy predicate without the need for explici...
Ajoy Kumar Datta, Maria Gradinariu, Sébasti...
108
Voted
MSS
2000
IEEE
89views Hardware» more  MSS 2000»
15 years 6 months ago
Access Coordination of Tertiary Storage for High Energy Physics Applications
We describe a real implementation of a software component that manages caching of files from a tertiary storage management system to a large disk cache developed for use in the a...
Luis M. Bernardo, Arie Shoshani, Alex Sim, Henrik ...
ICMCS
1999
IEEE
117views Multimedia» more  ICMCS 1999»
15 years 6 months ago
Scheduling of Adaptive Multimedia Documents
Multimedia documents are of importance in several application areas, such as education, training, advertising and entertainment. Since multimedia documents may comprise continuous...
Stefan Wirag
IPPS
1999
IEEE
15 years 6 months ago
A Communication Latency Hiding Parallelization of a Traffic Flow Simulation
This work implements and analyses a highway traffic flow simulation based on continuum modeling of traffic dynamics. A traffic-flow simulation was developed and mapped onto a para...
Charles Michael Johnston, Anthony T. Chronopoulos
137
Voted
LICS
1999
IEEE
15 years 6 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
« Prev « First page 1365 / 1579 Last » Next »