Sciweavers

231 search results - page 15 / 47
» Performance Prediction of J2EE Applications Using Messaging ...
Sort
View
MICRO
2002
IEEE
131views Hardware» more  MICRO 2002»
13 years 7 months ago
Protocol Wrappers for Layered Network Packet Processing in Reconfigurable Hardware
abstracting the operation of lower-level packet processing functions. The library synthesizes into field-programmable gate array (FPGA) logic and is utilized in a network platform ...
Florian Braun, John W. Lockwood, Marcel Waldvogel
SC
2005
ACM
14 years 1 months ago
SCTP versus TCP for MPI
SCTP (Stream Control Transmission Protocol) is a recently standardized transport level protocol with several features that better support the communication requirements of paralle...
Humaira Kamal, Brad Penoff, Alan Wagner
JCS
2010
80views more  JCS 2010»
13 years 2 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
IPPS
2009
IEEE
14 years 2 months ago
Improving RDMA-based MPI eager protocol for frequently-used buffers
MPI is the main standard for communication in high-performance clusters. MPI implementations use the Eager protocol to transfer small messages. To avoid the cost of memory registr...
Mohammad J. Rashti, Ahmad Afsahi
NDSS
2008
IEEE
14 years 2 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...