Sciweavers

688 search results - page 101 / 138
» Network Coding Protocols for Secret Key Distribution
Sort
View
132
Voted
BIS
2008
134views Business» more  BIS 2008»
15 years 4 months ago
Trustlet, Open Research on Trust Metrics
A trust metric is a technique for predicting how much a user of a social network might trust another user. This is especially beneficial in situations where most users are unknown ...
Paolo Massa, Kasper Souren
CUZA
2002
130views more  CUZA 2002»
15 years 2 months ago
Distributed Threads in Java
In this paper we present a mechanism for serializing the execution-state of a distributed Java application that is implemented on a conventional Object Request Broker (ORB) archite...
Danny Weyns, Eddy Truyen, Pierre Verbaeten
136
Voted
SAC
2006
ACM
15 years 8 months ago
Proactive resilience through architectural hybridization
In a recent work, we have shown that it is not possible to dependably build any type of distributed f fault or intrusiontolerant system under the asynchronous model. This result f...
Paulo Sousa, Nuno Ferreira Neves, Paulo Verí...
MSS
2003
IEEE
76views Hardware» more  MSS 2003»
15 years 7 months ago
A Scalable Architecture for Clustered Network Attached Storage
Network attached storage systems must provide highly available access to data while maintaining high performance, easy management, and maximum scalability. In this paper, we descr...
Jonathan D. Bright, John A. Chandy
129
Voted
ICPPW
2002
IEEE
15 years 7 months ago
MigThread: Thread Migration in DSM Systems
Distributed Shared Memory (DSM) systems provide a logically shared memory over physically distributed memory to enable parallel computation on Networks of Workstations (NOWs). In ...
Hai Jiang, Vipin Chaudhary