Sciweavers

2493 search results - page 465 / 499
» A survey of network virtualization
Sort
View
ICCCN
2007
IEEE
15 years 1 months ago
Fair Efficiency, or Low Average Delay without Starvation
Abstract-- Elastic applications are primarily interested in minimal delay achievable for their messages under current network load. In this paper, we investigate how to transmit su...
Sergey Gorinsky, Christoph Jechlitschek
AICT
2006
IEEE
123views Communications» more  AICT 2006»
15 years 1 months ago
Issues related to Development of Wireless Peer-to-Peer Games in J2ME
This paper describes and discusses challenges related to development of peer-to-peer games in J2ME using the available Bluetooth API (JSR82). By using Bluetooth on wireless device...
Alf Inge Wang, Michael Sars Norum, Carl-Henrik Wol...
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
15 years 1 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
GIS
2000
ACM
15 years 1 months ago
The NASA Digital Earth Testbed
The goal of Digital Earth (www.digitalearth.gov) is to create a virtual representation of our planet that enables a person to explore and interact with the vast amounts of natural...
Jeff de La Beaujardière, Horace Mitchell, R...
HPDC
2000
IEEE
15 years 1 months ago
Automatic Configuration and Run-time Adaptation of Distributed Applications
Increased platform heterogeneity and varying resource availability in distributed systems motivates the design of resource-aware applications, which ensure a desired performance l...
Fangzhe Chang, Vijay Karamcheti