Sciweavers

2822 search results - page 250 / 565
» Performance Analysis of Systems with Multi-Channel Communica...
Sort
View
CSFW
2002
IEEE
15 years 9 months ago
Probabilistic Analysis of Anonymity
We present a formal analysis technique for probabilistic security properties of peer-to-peer communication systems based on random message routing among members. The behavior of g...
Vitaly Shmatikov
SACMAT
2011
ACM
14 years 7 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
JUCS
2010
132views more  JUCS 2010»
15 years 2 months ago
A Mobile Intelligent Interruption Management System
: Mobile phones have become the most hated device that people cannot live without. For its primary usage as a communication device, it has surpassed any other medium. But it comes ...
Sina Zulkernain, Praveen Madiraju, Sheikh Iqbal Ah...
IPPS
1998
IEEE
15 years 8 months ago
Configuration Independent Analysis for Characterizing Shared-Memory Applications
Characterizing shared-memory applications provides insight to design efficient systems, and provides awareness to identify and correct application performance bottlenecks. Configu...
Gheith A. Abandah, Edward S. Davidson
INFOCOM
1993
IEEE
15 years 8 months ago
Experimental Evaluation of SunOS IPC and TCP/IP Protocol Implementation
Progress in the field of high speed networking and distributed applications has led to a debate in the research community on the suitability of existing protocols such as TCP/IP ...
Christos Papadopoulos, Guru M. Parulkar