Sciweavers

53 search results - page 5 / 11
» Multipath Execution: Opportunities and Limits
Sort
View
WETICE
2000
IEEE
14 years 29 days ago
Commitment-Based Enhancement of E-Commerce Protocols
Protocols represent the allowed interactions among communicating components. Protocols are essential in electronic commerce to constrain the behaviors of autonomous entities. Trad...
Pinar Yolum, Munindar P. Singh
WSC
1998
13 years 10 months ago
The Future of Java-based Simulation
Java-based simulation presents a unique opportunity for revolutionary changes in the process of developing simulation models and in the mission of the simulation software firms th...
Richard A. Kilgore, Kevin J. Healy, George B. Klei...
ICC
2007
IEEE
14 years 2 months ago
INTELiCON: Intelligent Connectivity Framework for the Simultaneous Use of Multiple Interfaces
— Widespread deployment of Wi-Fi together with 3G upgrades to cellular networks is rapidly creating areas where multiple wireless IP technologies are accessible. WiMAX will furth...
Kyriakos Manousakis, Praveen Gopalakrishnan, Dave ...
ASAP
2005
IEEE
169views Hardware» more  ASAP 2005»
14 years 2 months ago
Alleviating the Data Memory Bandwidth Bottleneck in Coarse-Grained Reconfigurable Arrays
It is widely known that parallel operation execution in multiprocessor systems generates a respective increase in memory accesses. Since the memory and bus subsystems provide a li...
Grigoris Dimitroulakos, Michalis D. Galanis, Costa...
ACSAC
2000
IEEE
14 years 1 months ago
Layering Boundary Protections: An Experiment in Information Assurance
The DARPA Information Assurance Program has the aim of developing and executing experiments that test specific hypotheses about defense in depth and dynamic defense capabilities. ...
D. Johnson, L. Benzinger