Sciweavers

759 search results - page 34 / 152
» What Can Be Implemented Anonymously
Sort
View
USENIX
1994
13 years 11 months ago
Concert/C: A Language for Distributed Programming
Concert/C is a new language for distributed C programming that extends ANSI C to support distribution and process dynamics. Concert/C provides the ability to create and terminate ...
Joshua S. Auerbach, Arthur P. Goldberg, Germ&aacut...
CORR
2010
Springer
122views Education» more  CORR 2010»
13 years 8 months ago
RoboCast: Asynchronous Communication in Robot Networks
Abstract. This paper introduces the RoboCast communication abstraction. The RoboCast allows a swarm of non oblivious, anonymous robots that are only endowed with visibility sensors...
Zohir Bouzid, Shlomi Dolev, Maria Potop-Butucaru, ...
ICC
2011
IEEE
206views Communications» more  ICC 2011»
12 years 9 months ago
A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet
—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...
HICSS
2003
IEEE
173views Biometrics» more  HICSS 2003»
14 years 3 months ago
An Activity-Based Model of Collective Knowledge
In the challenges faced by organisations in the area of knowledge management, there is clearly a role for information and communications technologies in supporting the exploitatio...
Helen Hasan
EUROSYS
2008
ACM
14 years 7 months ago
Task activity vectors: a new metric for temperature-aware scheduling
Non-uniform utilization of functional units in combination with hardware mechanisms such as clock gating leads to different power consumptions in different parts of a processor ch...
Andreas Merkel, Frank Bellosa