Sciweavers

2699 search results - page 450 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
HPDC
2006
IEEE
14 years 1 months ago
Replicating Nondeterministic Services on Grid Environments
Replication is a technique commonly used to increase the availability of services in distributed systems, including grid and web services. While replication is relatively easy for...
Xianan Zhang, Flavio Junqueira, Matti A. Hiltunen,...
ICNP
2006
IEEE
14 years 1 months ago
DPTree: A Balanced Tree Based Indexing Framework for Peer-to-Peer Systems
— Peer-to-peer (P2P) systems have been widely used for exchange of voluminous information and resources among thousands or even millions of users. Since shared data are normally ...
Mei Li, Wang-Chien Lee, Anand Sivasubramaniam
PEWASUN
2005
ACM
14 years 1 months ago
An error model for inter-vehicle communications in highway scenarios at 5.9GHz
The design and evaluation of Inter-Vehicle Communication (IVC) protocols rely much on the accurate and efficient computational simulations. For simulations of Medium Access Contro...
Yunpeng Zang, Lothar Stibor, Georgios Orfanos, Shu...
FAST
2010
13 years 10 months ago
Panache: A Parallel File System Cache for Global File Access
Cloud computing promises large-scale and seamless access to vast quantities of data across the globe. Applications will demand the reliability, consistency, and performance of a t...
Marc Eshel, Roger L. Haskin, Dean Hildebrand, Mano...
GRAPHICSINTERFACE
2008
13 years 9 months ago
Order and entropy in picture passwords
Previous efforts involving picture-based passwords have not focused on maintaining a measurably high level of entropy. Since password systems usually allow user selection of passw...
Saranga Komanduri, Dugald Ralph Hutchings