Sciweavers

2699 search results - page 449 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
Approximation Algorithms for Data Broadcast in Wireless Networks
—Broadcasting is a fundamental operation in wireless networks and plays an important role in the communication protocol design. In multihop wireless networks, however, interferen...
Rajiv Gandhi, Yoo-Ah Kim, Seungjoon Lee, Jiho Ryu,...
SIGCOMM
2009
ACM
14 years 2 months ago
Self management of a mobile thin client service
Mobile thin client computing is an enabler for the execution of demanding applications from mobile handhelds. In thin client computing, the application is executed on remote serve...
Lien Deboosere, Bert Vankeirsbilck, Pieter Simoens...
AINA
2008
IEEE
14 years 2 months ago
Optimal Resource Discovery Paths of Gnutella2
This paper shows that the performance of peer-to-peer resource discovery algorithms is upper bounded by a k-Steiner minimum tree and proposes an algorithm locating near-optimal qu...
Mikko Vapa, Annemari Auvinen, Yevgeniy Ivanchenko,...
ISCA
2008
IEEE
92views Hardware» more  ISCA 2008»
14 years 2 months ago
Counting Dependence Predictors
Modern processors rely on memory dependence prediction to execute load instructions as early as possible, speculating that they are not dependent on an earlier, unissued store. To...
Franziska Roesner, Doug Burger, Stephen W. Keckler
PDP
2007
IEEE
14 years 2 months ago
HAND: Highly Available Dynamic Deployment Infrastructure for Globus Toolkit 4
—Grid computing is becoming more and more attractive for coordinating large-scale heterogeneous resource sharing and problem solving. Of particular interest for effective Grid co...
Li Qi, Hai Jin, Ian T. Foster, Jarek Gawor