Sciweavers

3031 search results - page 106 / 607
» Reuse in the application layer
Sort
View
JSW
2007
191views more  JSW 2007»
13 years 10 months ago
Building Self-Configuring Data Centers with Cross Layer Coevolution
Abstract—This paper describes a biologically-inspired architecture, called SymbioticSphere, which allows data centers to autonomously adapt to dynamic environmental changes. Symb...
Paskorn Champrasert, Junichi Suzuki
PC
2007
112views Management» more  PC 2007»
13 years 9 months ago
Service address routing: a network-embedded resource management layer for cluster computing
Service address routing is introduced as a novel and powerful paradigm for the integration of resource management functions into the interconnection fabric of cluster computers. S...
Isaac D. Scherson, Daniel S. Valencia, Enrique Cau...
PERCOM
2010
ACM
13 years 8 months ago
Security analysis of reliable transport layer protocols for wireless sensor networks
End-to-end reliability of communications is an important requirement in many applications of wireless sensor networks. For this reason, a number of reliable transport protocols sp...
Levente Buttyán, L. Csik
PKC
1999
Springer
142views Cryptology» more  PKC 1999»
14 years 2 months ago
Encrypted Message Authentication by Firewalls
Firewalls typically filter network traffic at several different layers. At application layer, filtering is based on various security relevant information encapsulated into proto...
Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
AICT
2006
IEEE
14 years 1 months ago
Transfer Rate Models for Gnutella Signaling Traffic
This paper reports on transfer rate models for the Gnutella signaling protocol. New results on message-level and IP-level rates are presented. The models are based on traffic capt...
Dragos Ilie, David Erman, Adrian Popescu