Sciweavers

1665 search results - page 156 / 333
» On Quiescent Reliable Communication
Sort
View
CLUSTER
2007
IEEE
14 years 4 months ago
The challenges and rewards of petascale clusters
-Jul 2 - Santa Clara Conv Ctr - abstracts by 4/30 Asilomar Conference on Signals, Systems, and Computers due by June 1 [more] - Nov 1-4, 2009 - Asilomar Conf Grounds, Pacific Grove...
Mark Seager
CODES
2007
IEEE
14 years 4 months ago
Improved response time analysis of tasks scheduled under preemptive Round-Robin
Round-Robin scheduling is the most popular time triggered scheduling policy, and has been widely used in communication networks for the last decades. It is an efficient schedulin...
Razvan Racu, Li Li, Rafik Henia, Arne Hamann, Rolf...
ICDCS
2007
IEEE
14 years 4 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee
ICIP
2007
IEEE
14 years 4 months ago
Automated Solder Inspection Method by Means of X-ray Oblique Computed Tomography
High-density LSI packages such as ball grid array (BGA) are being utilised in the car electronics and communications infrastructure products. These products require a high-speed a...
Atsushi Teramoto, Takayuki Murakoshi, Masatoshi Ts...
ICPP
2007
IEEE
14 years 4 months ago
Incentive-Driven P2P Anonymity System: A Game-Theoretic Approach
– Anonymous communication systems built on P2P infrastructures using anonymity forwarders are frequently affected by the churn problem, i.e. frequent joins and leaves of nodes. T...
Souvik Ray, Giora Slutzki, Zhao Zhang