Sciweavers

828 search results - page 148 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
112
Voted
ICDCS
2008
IEEE
15 years 9 months ago
stdchk: A Checkpoint Storage System for Desktop Grid Computing
— Checkpointing is an indispensable technique to provide fault tolerance for long-running high-throughput applications like those running on desktop grids. This paper argues that...
Samer Al-Kiswany, Matei Ripeanu, Sudharshan S. Vaz...
131
Voted
TCOM
2010
107views more  TCOM 2010»
15 years 1 months ago
A Simple Recruitment Scheme of Multiple Nodes for Cooperative MAC
—Physical (PHY) layer cooperation in a wireless network allows neighboring nodes to share their communication resources in order to create a virtual antenna array by means of dis...
Francesco Verde, Thanasis Korakis, Elza Erkip, Ann...
117
Voted
IDEAS
2008
IEEE
96views Database» more  IDEAS 2008»
15 years 9 months ago
Robust aggregation in peer-to-peer database systems
Peer-to-peer database systems (P2PDBs) aim at providing database services with node autonomy, high availability and loose coupling between participating nodes by building the DBMS...
Norvald H. Ryeng, Kjetil Nørvåg
141
Voted
JSW
2008
123views more  JSW 2008»
15 years 2 months ago
Component-oriented Reliability Analysis and Optimal Version-upgrade Problems for Open Source Software
The current software development environment has been changing into new development paradigms such as concurrent distributed development environment and the so-called open source p...
Yoshinobu Tamura, Shigeru Yamada
129
Voted
AINA
2009
IEEE
15 years 9 months ago
Modeling Multiprocessor Cache Protocol Impact on MPI Performance
This paper presents a modeling method particularly suited to analyze interactions between Message Passing Interface MPI library execution and distributed cache coherence protocol....
Ghassan Chehaibar, Meriem Zidouni, Radu Mateescu