Sciweavers

142 search results - page 5 / 29
» Near-perfect Token Distribution
Sort
View
ICDCS
1995
IEEE
13 years 11 months ago
A Distributed K-Mutual Exclusion Algorithm
This paper presents a token-based K-mutual exchsion algorithm. The algorithm uses K tokens and a dynamic forest structure for each token. This structure is used to forward token r...
Shailaja Bulgannawar, Nitin H. Vaidya
IPPS
2007
IEEE
14 years 1 months ago
Recurrent neural networks towards detection of SQL attacks
In the paper we present a new approach based on application of neural networks to detect SQL attacks. SQL attacks are those attacks that take advantage of using SQL statements to ...
Jaroslaw Skaruz, Franciszek Seredynski
IPPS
2006
IEEE
14 years 1 months ago
Optimal map construction of an unknown torus
In this paper we consider the map construction problem in the case of an anonymous, unoriented torus of unknown size. An agent that can move from node to neighbouring node in the ...
Hanane Becha, Paola Flocchini
DT
2007
65views more  DT 2007»
13 years 7 months ago
A Highly Scalable GALS Crossbar Using Token Ring Arbitration
- This paper presents a new low latency Crossbar design that can be used to interface systems working at different frequencies. For case of multiple input ports contending for same...
Tejpal Singh, Alexander Taubin
ICPP
1999
IEEE
13 years 11 months ago
Performance Study of Token-Passing Protocol for Traffic Multiplicity in Optical Networks
This paper extended a mathematical technique to model the behaviour of token-passing protocol in a star-coupled wavelength-division multiplexing (WDM) optical network for traffic ...
S. Selvakennedy, Ashwani K. Ramani