Sciweavers

7891 search results - page 1404 / 1579
» A Distributed Scheduling Framework
Sort
View
147
Voted
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
15 years 9 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
APSEC
2003
IEEE
15 years 9 months ago
JINI/J2EE Bridge for Large-scale IP Phone Services
Current IP phone architectures which bring phone services to a distributed open environment are eraltively static and do not scale well. An IP phone environment should be more dyn...
Jia Yu, Jan Newmarch, Michael Geisler
134
Voted
CGO
2003
IEEE
15 years 9 months ago
Dynamic Trace Selection Using Performance Monitoring Hardware Sampling
Optimizing programs at run-time provides opportunities to apply aggressive optimizations to programs based on information that was not available at compile time. At run time, prog...
Howard Chen, Wei-Chung Hsu, Dong-yuan Chen
CLUSTER
2003
IEEE
15 years 9 months ago
Application-Bypass Reduction for Large-Scale Clusters
Process skew is an important factor in the performance of parallel applications, especially in large-scale clusters. Reduction is a common collective operation which, by its natur...
Adam Wagner, Darius Buntinas, Dhabaleswar K. Panda...
COOPIS
2003
IEEE
15 years 9 months ago
Advertising Games for Web Services
In: Proceedings of the Eleventh International Conference on Cooperative Information Systems (CoopIS-03), pp. 93–109, Springer-Verlag LNCS Series. c 2003 by Springer-Verlag. We a...
Alessandro Agostini, Paolo Avesani
« Prev « First page 1404 / 1579 Last » Next »