Sciweavers

2478 search results - page 368 / 496
» Message from the Chair
Sort
View
IPPS
2006
IEEE
14 years 4 months ago
Preserving source location privacy in monitoring-based wireless sensor networks
While a wireless sensor network is deployed to monitor certain events and pinpoint their locations, the location information is intended only for legitimate users. However, an eav...
Yong Xi, Loren Schwiebert, Weisong Shi
IPPS
2006
IEEE
14 years 4 months ago
A framework to develop symbolic performance models of parallel applications
Performance and workload modeling has numerous uses at every stage of the high-end computing lifecycle: design, integration, procurement, installation and tuning. Despite the trem...
Sadaf R. Alam, Jeffrey S. Vetter
NOMS
2006
IEEE
129views Communications» more  NOMS 2006»
14 years 4 months ago
A Policy-Based Hierarchical Approach for Management of Grids and Networks
Grids are distributed infrastructures that have been used as an important and powerful resource for distributed computing. Since the nodes of a grid can potentially be located in ...
Tiago Fioreze, Ricardo Neisse, Lisandro Zambenedet...
SAINT
2006
IEEE
14 years 4 months ago
A Capability-Based Access Control Architecture for Multi-Domain Publish/Subscribe Systems
Publish/subscribe has emerged as an attractive communication paradigm for building Internet-wide distributed systems by decoupling message senders from receivers. So far most of t...
Lauri I. W. Pesonen, David M. Eyers, Jean Bacon
CONEXT
2006
ACM
14 years 4 months ago
Using forgetful routing to control BGP table size
Running the Border Gateway Protocol (BGP), the Internet’s interdomain routing protocol, consumes a large amount of memory. A BGP-speaking router typically stores one or more rou...
Elliott Karpilovsky, Jennifer Rexford