Sciweavers

2116 search results - page 215 / 424
» Resource Analysis by Sup-interpretation
Sort
View
P2P
2006
IEEE
135views Communications» more  P2P 2006»
15 years 10 months ago
Ordered Slicing of Very Large-Scale Overlay Networks
Recently there has been an increasing interest to harness the potential of P2P technology to design and build rich environments where services are provided and multiple applicatio...
Márk Jelasity, Anne-Marie Kermarrec
IPPS
2005
IEEE
15 years 10 months ago
A Compiler and Runtime Infrastructure for Automatic Program Distribution
This paper presents the design and the implementation of a compiler and runtime infrastructure for automatic program distribution. We are building a research infrastructure that e...
Roxana Diaconescu, Lei Wang, Zachary Mouri, Matt C...
MICRO
2005
IEEE
117views Hardware» more  MICRO 2005»
15 years 10 months ago
A Quantum Logic Array Microarchitecture: Scalable Quantum Data Movement and Computation
Recent experimental advances have demonstrated technologies capable of supporting scalable quantum computation. A critical next step is how to put those technologies together into...
Tzvetan S. Metodi, Darshan D. Thaker, Andrew W. Cr...
SENSYS
2005
ACM
15 years 10 months ago
A new approach for establishing pairwise keys for securing wireless sensor networks
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symme...
Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rother...
107
Voted
ICCNMC
2005
Springer
15 years 10 months ago
Modeling and Performance Evaluation of Handover Service in Wireless Networks
With the development of wireless network, more and more applications require the QoS for message transmission. In order to enhance the QoS service in the dynamic changing wireless ...
Wenfeng Du, Lidong Lin, Weijia Jia, Guojun Wang