Sciweavers

329 search results - page 8 / 66
» Requirements for and Evaluation of RMI Protocols for Scienti...
Sort
View
IPOM
2009
Springer
14 years 2 months ago
A Feasibility Evaluation on Name-Based Routing
Abstract. The IPv4 addressing scheme has been the standard for Internet communication since it was established in the 1960s. However, the enormous increase in Internet traffic usag...
Haesung Hwang, Shingo Ata, Masayuki Murata
AOSD
2005
ACM
14 years 1 months ago
An expressive aspect language for system applications with Arachne
C applications, in particular those using operating system level services, frequently comprise multiple crosscutting concerns: network protocols and security are typical examples ...
Rémi Douence, Thomas Fritz, Nicolas Loriant...
ASIACRYPT
2009
Springer
14 years 2 months ago
Secure Multi-party Computation Minimizing Online Rounds
Multi-party secure computations are general important procedures to compute any function while keeping the security of private inputs. In this work we ask whether preprocessing can...
Seung Geol Choi, Ariel Elbaz, Tal Malkin, Moti Yun...
ICNP
1998
IEEE
13 years 11 months ago
Evaluating the Overheads of Source-Directed Quality-of-Service Routing
Quality-of-service (QoS) routing satisfiesapplication performance requirements and optimizes network resource usage but effective path-selection schemes require the distribution o...
Anees Shaikh, Jennifer Rexford, Kang G. Shin
LCPC
2007
Springer
14 years 1 months ago
Evaluation of RDMA Opportunities in an Object-Oriented DSM
Remote Direct Memory Access (RDMA) is a technology to update a remote machine’s memory without intervention at the receiver side. We evaluate where RDMA can be usefully applied a...
Ronald Veldema, Michael Philippsen