Sciweavers

2699 search results - page 393 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
EUC
2004
Springer
14 years 3 months ago
Embedded System Design for Network Time Synchronization
Every computer needs a timer mechanism to keep track of current time and also for various accounting purposes such as calculating the time spent by a process in CPU utilization, di...
So-Young Hwang, Dong-Hui Yu, Ki-Joune Li
NOMS
2002
IEEE
130views Communications» more  NOMS 2002»
14 years 3 months ago
End-to-end service failure diagnosis using belief networks
We present fault localization techniques suitable for diagnosing end-to-end service problems in communication systems with complex topologies. We refine a layered system model th...
Malgorzata Steinder, Adarshpal S. Sethi
DAC
2007
ACM
14 years 2 months ago
Integrated Droplet Routing in the Synthesis of Microfluidic Biochips
Microfluidic biochips are revolutionizing many areas of biochemistry and biomedical sciences. Several synthesis tools have recently been proposed for the automated design of bioch...
Tao Xu, Krishnendu Chakrabarty
USENIX
2003
13 years 11 months ago
Fast, Scalable Disk Imaging with Frisbee
Both researchers and operators of production systems are frequently faced with the need to manipulate entire disk images. Convenient and fast tools for saving, transferring, and i...
Mike Hibler, Leigh Stoller, Jay Lepreau, Robert Ri...
CORR
2010
Springer
147views Education» more  CORR 2010»
13 years 10 months ago
Multistage Relaying Using Interference Networks
Wireless networks with multiple nodes that relay information from a source to a destination are expected to be deployed in many applications. In this work, we consider multihoppin...
Bama Muthuramalingam, Srikrishna Bhashyam, Andrew ...