Sciweavers

1777 search results - page 246 / 356
» Programming Cryptographic Protocols
Sort
View
SAC
2008
ACM
13 years 8 months ago
Improving denial of service resistance using dynamic local adaptations
We improve the resistance of gossip-based multicast to (Distributed) Denial of Service (DoS) attacks using dynamic local adaptations at each node. Each node estimates the current ...
Gal Badishi, Idit Keidar
CN
2000
128views more  CN 2000»
13 years 8 months ago
The Network Workbench: network simulation software for academic investigation of Internet concepts
Simulation offers significant advantages as a basis for academic projects in computer networking. many unimportant details can be abstracted away, and also because simulations can...
J. Mark Pullen
PLDI
2012
ACM
11 years 11 months ago
Speculative linearizability
Linearizability is a key design methodology for reasoning about tations of concurrent abstract data types in both shared memory and message passing systems. It provides the illusi...
Rachid Guerraoui, Viktor Kuncak, Giuliano Losa
CLUSTER
2003
IEEE
14 years 2 months ago
Coordinated Checkpoint versus Message Log for Fault Tolerant MPI
— Large Clusters, high availability clusters and Grid deployments often suffer from network, node or operating system faults and thus require the use of fault tolerant programmin...
Aurelien Bouteiller, Pierre Lemarinier, Gér...
ECOOP
1993
Springer
14 years 28 days ago
A Language Framework for Multi-Object Coordination
Abstract. We have developed language support for the expression of multiobject coordination. In our language, coordination patterns can be speci ed abstractly, independent of the p...
Svend Frølund, Gul Agha