Sciweavers

2699 search results - page 430 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
OOPSLA
2009
Springer
14 years 2 months ago
A concurrent dynamic analysis framework for multicore hardware
Software has spent the bounty of Moore’s law by solving harder problems and exploiting abstractions, such as highlevel languages, virtual machine technology, binary rewritdynami...
Jungwoo Ha, Matthew Arnold, Stephen M. Blackburn, ...
TASE
2010
IEEE
13 years 2 months ago
Analytic Calculus of Response Time in Networked Automation Systems
--This paper presents a novel approach to evaluate the response time in networked automation systems (NAS) that use a client/server protocol. The developments introduced are derive...
Boussad Addad, Said Amari, Jean-Jacques Lesage
GLOBECOM
2009
IEEE
14 years 2 months ago
Adaptive Probabilistic Medium Access in MPR-Capable Ad-Hoc Wireless Networks
—Medium access in ad-hoc wireless networks must be performed in a distributed fashion due to lack of coordination between nodes. Specifically, when nodes are capable of receivin...
Majid Ghanbarinejad, Christian Schlegel, Pawel Gbu...
SIGCOMM
2009
ACM
14 years 2 months ago
Practical, distributed channel assignment and routing in dual-radio mesh networks
Realizing the full potential of a multi-radio mesh network involves two main challenges: how to assign channels to radios at each node to minimize interference and how to choose h...
Aditya Dhananjay, Hui Zhang, Jinyang Li, Lakshmina...
CCGRID
2005
IEEE
14 years 1 months ago
Logistical multicast for data distribution
This paper describes a simple scheduling procedure for use in multicast data distribution within a logistical networking infrastructure. The goal of our scheduler is to generate a...
Jason Zurawski, D. Martin Swany, Micah Beck, Ying ...