Sciweavers

308 search results - page 38 / 62
» Message Protocols for Provisioning and Usage of Computing Se...
Sort
View
ESA
2010
Springer
170views Algorithms» more  ESA 2010»
15 years 5 months ago
Streaming Graph Computations with a Helpful Advisor
Motivated by the trend to outsource work to commercial cloud computing services, we consider a variation of the streaming paradigm where a streaming algorithm can be assisted by a...
Graham Cormode, Michael Mitzenmacher, Justin Thale...
EURONGI
2006
Springer
15 years 8 months ago
Self-protection in P2P Networks: Choosing the Right Neighbourhood
Abstract. In unstructured peer-to-peer networks, as in real life, a good neighbourhood is not only crucial for a peaceful sleep, but also for an exchange of important gossips and f...
Ivan Martinovic, Christof Leng, Frank A. Zdarsky, ...
AICCSA
2005
IEEE
168views Hardware» more  AICCSA 2005»
15 years 10 months ago
A dynamic range resource reservation protocol for QoS support in wireless networks
— Mobile ad hoc networks (MANETs) provide a powerful and dynamic platform to enable mobile computers to establish communications without an existing infrastructure. In order to p...
Imad Jawhar, Jie Wu
HPCC
2005
Springer
15 years 9 months ago
Securing the MPLS Control Plane
— In an increasingly hostile environment, the need for security in network infrastructure is stronger than ever, especially for Multi-Protocol Label Switching (MPLS), widely used...
Francesco Palmieri, Ugo Fiore
LCPC
2007
Springer
15 years 10 months ago
Evaluation of RDMA Opportunities in an Object-Oriented DSM
Remote Direct Memory Access (RDMA) is a technology to update a remote machine’s memory without intervention at the receiver side. We evaluate where RDMA can be usefully applied a...
Ronald Veldema, Michael Philippsen