Sciweavers

4305 search results - page 541 / 861
» Analysing Protocol Implementations
Sort
View
IFIP
2003
Springer
15 years 10 months ago
A Service Discovery Model for Wireless and Mobile Terminals in IPv6
As the mobility and the number of affordable, powerful, and highly portable devices becoming networked increases, so will the amount of networked services offered, managed and disc...
Bilhanan Silverajan, Jaakko Kalliosalo, Jarmo Harj...
CLUSTER
2002
IEEE
15 years 10 months ago
Algorithmic Mechanism Design for Load Balancing in Distributed Systems
Computational Grids are large scale computing system composed of geographically distributed resources (computers, storage etc.) owned by self interested agents or organizations. T...
Daniel Grosu, Anthony T. Chronopoulos
COMPSAC
2002
IEEE
15 years 10 months ago
Component Based System Framework for Dynamic B2B Interaction
Business-to-Business (B2B) collaboration is becoming a pivotal way to bring today’s enterprises to success in the dynamically changing e-business environment. Though many busine...
Jinmin Hu, Paul W. P. J. Grefen
150
Voted
DSN
2002
IEEE
15 years 10 months ago
Secure Intrusion-tolerant Replication on the Internet
This paper describes a Secure INtrusion-Tolerant Replication Architecture1 (SINTRA) for coordination in asynchronous networks subject to Byzantine faults. SINTRA supplies a number...
Christian Cachin, Jonathan A. Poritz
HOTI
2002
IEEE
15 years 10 months ago
Distributed-and-Split Data-Control Extension to SCSI for Scalable Storage Area Networks
A “Storage-Area Network” (SAN) comprises computers (“Initiators”), storage “block devices” (“Targets”), and a Controller(s). Most SANs use the SCSI protocol over v...
Yitzhak Birk, Nafea Bishara