Sciweavers

110 search results - page 20 / 22
» A Hierarchy of Communication Models for Message Sequence Cha...
Sort
View
IH
1999
Springer
13 years 10 months ago
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast
Abstract. Traditionally, cryptographic protocols are described as a sequence of steps, in each of which one principal sends a message to another. It is assumed that the fundamental...
Frank Stajano, Ross J. Anderson
LCTRTS
2005
Springer
13 years 11 months ago
Cache aware optimization of stream programs
Effective use of the memory hierarchy is critical for achieving high performance on embedded systems. We focus on the class of streaming applications, which is increasingly preval...
Janis Sermulins, William Thies, Rodric M. Rabbah, ...
GPC
2008
Springer
13 years 7 months ago
Layered Peer-to-Peer Architecture for Mobile Web Services via Converged Cellular and Ad Hoc Networks
Mobile communication technology is rapidly developed with the enhanced networking capacities as well as the expanding population of mobile subscribers. Providing Web services via ...
Zhonghong Ou, Meina Song, Hui Chen, Junde Song
HPCN
2000
Springer
13 years 9 months ago
An Analytical Model for a Class of Architectures under Master-Slave Paradigm
We build an analytical model for an application utilizing master-slave paradigm. In the model, only three architecture parameters are used: latency, bandwidth and flop rate. Instea...
Yasemin Yalçinkaya, Trond Steihaug
PODC
2003
ACM
13 years 11 months ago
Performing work with asynchronous processors: message-delay-sensitive bounds
This paper considers the problem of performing tasks in asynchronous distributed settings. This problem, called DoAll, has been substantially studied in synchronous models, but th...
Dariusz R. Kowalski, Alexander A. Shvartsman