Sciweavers

347 search results - page 42 / 70
» Proactive Computing
Sort
View
PKC
2009
Springer
121views Cryptology» more  PKC 2009»
14 years 10 months ago
On the Theory and Practice of Personal Digital Signatures
We take a step towards a more realistic modeling of personal digital signatures, where a human user, his mobile equipment, his PC and a server are all considered as independent pla...
Gert Læssøe Mikkelsen, Ivan Damg&arin...
IPPS
2007
IEEE
14 years 4 months ago
Task-pushing: a Scalable Parallel GC Marking Algorithm without Synchronization Operations
This paper describes a scalable parallel marking technique for garbage collection that does not employ any synchronization operation. To achieve good scalability, two major design...
Ming Wu, Xiao-Feng Li
GCC
2007
Springer
14 years 4 months ago
Detecting and Reducing Partition Nodes in Limited-routing-hop Overlay Networks
Many Internet applications use overlay networks as their basic facilities, like resource sharing, collaborative computing, and so on. Considering the communication cost, most over...
Zhenhua Li, Guihai Chen
ICAC
2006
IEEE
14 years 4 months ago
A Runtime Adaptation Framework for Native C and Bytecode Applications
— The need for self-healing software to respond with a reactive, proactive or preventative action as a result of changes in its environment has added the non-functional requireme...
Rean Griffith, Gail E. Kaiser
HPDC
2005
IEEE
14 years 3 months ago
Interest-aware information dissemination in small-world communities
Information dissemination is a fundamental and frequently occuring problem in large, dynamic, distributed systems. We propose a novel approach to this problem, interest-aware info...
Adriana Iamnitchi, Ian T. Foster