Sciweavers

2699 search results - page 479 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
OTM
2009
Springer
14 years 7 days ago
Optimizing Data Management in Grid Environments
Grids currently serve as platforms for numerous scientific as well as business applications that generate and access vast amounts of data. In this paper, we address the need for e...
Antonis Zissimos, Katerina Doka, Antony Chazapis, ...
INFOCOM
2000
IEEE
14 years 2 days ago
Consideration of Receiver Interest for IP Multicast Delivery
—Large-scale applications are characterized by a large number of dynamic and often interactive group members. The nature of these applications is such that participants are not i...
Brian Neil Levine, Jon Crowcroft, Christophe Diot,...
CODES
1998
IEEE
13 years 12 months ago
Hardware/software co-design of an ATM network interface card: a case study
This paper discusses a case study, the co-design of an ATM Network Interface Card (NIC). The NIC is aimed to interface applications with the physical network line. It is composed ...
Jean-Marc Daveau, Gilberto Fernandes Marchioro, Ah...
IPPS
1997
IEEE
13 years 12 months ago
Enhancing Software DSM for Compiler-Parallelized Applications
Current parallelizing compilers for message-passing machines only support a limited class of data-parallel applications. One method for eliminating this restriction is to combine ...
Peter J. Keleher, Chau-Wen Tseng
ICDCSW
2007
IEEE
13 years 11 months ago
Predictive Directional Greedy Routing in Vehicular Ad hoc Networks
VANETs (Vehicle Ad hoc NETworks) are highly mobile wireless ad hoc networks targeted to support vehicular safety and other commercial applications. Conventional routing protocols ...
Jiayu Gong, Cheng-Zhong Xu, James Holle