Sciweavers

3052 search results - page 146 / 611
» Weakly Distributive Domains
Sort
View
ASWEC
2006
IEEE
15 years 10 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge
FOSSACS
2005
Springer
15 years 10 months ago
Stochastic Transition Systems for Continuous State Spaces and Non-determinism
Abstract. We study the interaction between non-deterministic and probabilistic behaviour in systems with continuous state spaces, arbitrary probability distributions and uncountabl...
Stefano Cattani, Roberto Segala, Marta Z. Kwiatkow...
IPPS
2003
IEEE
15 years 9 months ago
Exploring the Predictability of MPI Messages
Scalability to large number of processes is one of the weaknesses of current MPI implementations. Standard implementations are able to scale to hundreds of nodes, but no beyond th...
Felix Freitag, Jordi Caubet, Montse Farreras, Toni...
CCGRID
2002
IEEE
15 years 9 months ago
The Internet Backplane Protocol: A Study in Resource Sharing
In this work we present the Internet Backplane Protocol (IBP), a middleware created to allow the sharing of storage resources, implemented as part of the network fabric. IBP allow...
Alessandro Bassi, Micah Beck, Graham E. Fagg, Terr...
IPPS
1998
IEEE
15 years 8 months ago
Multiprocessor Scheduling Using Mean-Field Annealing
This paper presents our work on the static task scheduling model using the mean-field annealing (MFA) technique. Mean-field annealing is a technique of thermostatic annealing that...
Shaharuddin Salleh, Albert Y. Zomaya