Sciweavers

2699 search results - page 431 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
AE
2005
Springer
14 years 1 months ago
An Immunological Algorithm for Global Numerical Optimization
Abstract. Numerical optimization of given objective functions is a crucial task in many real-life problems. The present article introduces an immunological algorithm for continuous...
Vincenzo Cutello, Giuseppe Narzisi, Giuseppe Nicos...
ASPLOS
2004
ACM
14 years 1 months ago
D-SPTF: decentralized request distribution in brick-based storage systems
Distributed Shortest-Positioning Time First (D-SPTF) is a request distribution protocol for decentralized systems of storage servers. D-SPTF exploits high-speed interconnects to d...
Christopher R. Lumb, Richard A. Golding
PADS
2004
ACM
14 years 1 months ago
Conservative Synchronization of Large-Scale Network Simulations
Parallel discrete event simulation techniques have enabled the realization of large-scale models of communication networks containing millions of end hosts and routers. However, t...
Alfred Park, Richard M. Fujimoto, Kalyan S. Peruma...
SIGCOMM
2004
ACM
14 years 1 months ago
Routing in a delay tolerant network
We formulate the delay-tolerant networking routing problem, where messages are to be moved end-to-end across a connectivity graph that is time-varying but whose dynamics may be kn...
Sushant Jain, Kevin R. Fall, Rabin K. Patra
NOSSDAV
2004
Springer
14 years 1 months ago
AMPS: a flexible, scalable proxy testbed for implementing streaming services
— We present the design, implementation, and performance evaluation of AMPS — a flexible, scalable proxy testbed that supports a wide and extensible set of next-generation pro...
Xiaolan (Ellen) Zhang, Michael K. Bradshaw, Yang G...