Sciweavers

4305 search results - page 631 / 861
» Analysing Protocol Implementations
Sort
View
ISCAS
2007
IEEE
149views Hardware» more  ISCAS 2007»
15 years 10 months ago
Compact, Low Power Wireless Sensor Network System for Line Crossing Recognition
— Many application-specific wireless sensor network (WSN) systems require small size and low power features due to their limited resources, and their use in distributed, wireles...
Chung-Ching Shen, Roni Kupershtok, Bo Yang, Felice...
ISCC
2007
IEEE
211views Communications» more  ISCC 2007»
15 years 10 months ago
High Performance Java Remote Method Invocation for Parallel Computing on Clusters
This paper presents a more efficient Java Remote Method Invocation (RMI) implementation for high-speed clusters. The use of Java for parallel programming on clusters is limited b...
Guillermo L. Taboada, Carlos Teijeiro, Juan Touri&...
NCA
2007
IEEE
15 years 10 months ago
GORDA: An Open Architecture for Database Replication
Although database replication has been a standard feature in database management systems for a long time, third party solutions have been enjoying an increasing popularity. These ...
Alfrânio Correia Jr., José Pereira, L...
PDP
2007
IEEE
15 years 10 months ago
HAND: Highly Available Dynamic Deployment Infrastructure for Globus Toolkit 4
—Grid computing is becoming more and more attractive for coordinating large-scale heterogeneous resource sharing and problem solving. Of particular interest for effective Grid co...
Li Qi, Hai Jin, Ian T. Foster, Jarek Gawor
SASO
2007
IEEE
15 years 10 months ago
Identifying Malicious Peers Before It's Too Late: A Decentralized Secure Peer Sampling Service
Many unstructured peer to peer (P2P) systems rely on a Peer Sampling Service (PSS) that returns randomly sampled nodes from the population comprising the system. PSS protocols are...
Gian Paolo Jesi, David Hales, Maarten van Steen