Sciweavers

647 search results - page 64 / 130
» Simulating Failures on Large-Scale Systems
Sort
View
CORR
2008
Springer
106views Education» more  CORR 2008»
13 years 8 months ago
GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries
Resource and cost constraints remain a challenge for wireless sensor network security. In this paper, we propose a new approach to protect confidentiality against a parasitic adver...
Jun Luo, Panos Papadimitratos, Jean-Pierre Hubaux
SIGCSE
2000
ACM
193views Education» more  SIGCSE 2000»
14 years 7 days ago
Experimentation with bounded buffer synchronization
Undergraduates are usually introduced to synchronization in operating systems through a discussion of classical problems such as reader-writer or producers-consumers. The traditio...
Steven Robbins
GLOBECOM
2008
IEEE
13 years 8 months ago
Traffic-Aware Inter-Domain Routing for Improved Internet Routing Stability
This paper develops and studies a traffic-aware inter-domain routing (TIDR) protocol, which drastically improves the stability of the BGP-based inter-domain routing system. TIDR is...
Peng Chen, Woon Hyung Cho, Zhenhai Duan, Xin Yuan
BMCBI
2005
130views more  BMCBI 2005»
13 years 7 months ago
Squid - a simple bioinformatics grid
Background: BLAST is a widely used genetic research tool for analysis of similarity between nucleotide and protein sequences. This paper presents a software application entitled &...
Paulo C. Carvalho, Rafael V. Glória, Antoni...
ANSS
2007
IEEE
13 years 9 months ago
Modelling Network Memory Servers with Parallel Processors, Break-downs and Repairs
This paper presents an analytical method for the performability evaluation of a previously reported network memory server attached to a local area network. To increase the perform...
Orhan Gemikonakli, Glenford E. Mapp, Enver Ever, D...