Sciweavers

3031 search results - page 456 / 607
» Reuse in the application layer
Sort
View
148
Voted
IPCCC
2007
IEEE
15 years 10 months ago
Detecting Misused Keys in Wireless Sensor Networks
Key management is the cornerstone for secure communication in sensor networks. Researchers have recently developed many techniques to setup pairwise keys between sensor nodes. How...
Donggang Liu, Qi Dong
151
Voted
IPPS
2007
IEEE
15 years 10 months ago
A Configuration Control Mechanism Based on Concurrency Level for a Reconfigurable Consistency Algorithm
A Reconfigurable Consistency Algorithm (RCA) is an algorithm that guarantees the consistency in Distributed Shared Memory (DSM) Systems. In a RCA, there is a Configuration Control...
Christiane V. Pousa, Luís Fabrício W...
133
Voted
EUROPAR
2007
Springer
15 years 10 months ago
Virtual Cluster Management with Xen
Recently, virtualization of hardware resources to run multiple instances of independent virtual machines over physical hosts has gained popularity due to an industry-wide focus on ...
Nikhil Bhatia, Jeffrey S. Vetter
GLVLSI
2006
IEEE
126views VLSI» more  GLVLSI 2006»
15 years 10 months ago
Hardware/software partitioning of operating systems: a behavioral synthesis approach
In this paper we propose a hardware real time operating system (HW-RTOS) solution that makes use of a dedicated hardware in order to replace the standard support provided by the P...
Sathish Chandra, Francesco Regazzoni, Marcello Laj...
NETGAMES
2006
ACM
15 years 10 months ago
On the support for heterogeneity in networked virtual environment
This paper presents our ongoing research activity to design and implement a framework for an networked virtual environment (NVE) that efficiently supports both hardware and softwa...
Hiroshi Fujinoki