Sciweavers

483 search results - page 40 / 97
» Patterns of Protocols
Sort
View
TCC
2009
Springer
132views Cryptology» more  TCC 2009»
14 years 8 months ago
Authenticated Adversarial Routing
: The aim of this paper is to demonstrate the feasibility of authenticated throughput-ecient routing in an unreliable and dynamically changing synchronous network in which the majo...
Yair Amir, Paul Bunn, Rafail Ostrovsky
IEEEPACT
2008
IEEE
14 years 2 months ago
Improving support for locality and fine-grain sharing in chip multiprocessors
Both commercial and scientific workloads benefit from concurrency and exhibit data sharing across threads/processes. The resulting sharing patterns are often fine-grain, with t...
Hemayet Hossain, Sandhya Dwarkadas, Michael C. Hua...
INTERNET
2006
156views more  INTERNET 2006»
13 years 7 months ago
Service Mosaic: A Model-Driven Framework for Web Services Life-Cycle Management
Web services provide abstractions for simplifying integration at lower levels of the interaction stacks, they don't yet help simplify integration at higher abstraction levels ...
Boualem Benatallah, Fabio Casati, Farouk Toumani, ...
IPSN
2009
Springer
14 years 2 months ago
Anti-jamming for embedded wireless networks
Resilience to electromagnetic jamming and its avoidance are difficult problems. It is often both hard to distinguish malicious jamming from congestion in the broadcast regime and ...
Miroslav Pajic, Rahul Mangharam
LCPC
2007
Springer
14 years 1 months ago
Evaluation of RDMA Opportunities in an Object-Oriented DSM
Remote Direct Memory Access (RDMA) is a technology to update a remote machine’s memory without intervention at the receiver side. We evaluate where RDMA can be usefully applied a...
Ronald Veldema, Michael Philippsen