Sciweavers

1869 search results - page 162 / 374
» Analysis of Network Processing Workloads
Sort
View
ISI
2005
Springer
15 years 10 months ago
Integrating Private Databases for Data Analysis
In today’s globally networked society, there is a dual demand on both information sharing and information protection. A typical scenario is that two parties wish to integrate the...
Ke Wang, Benjamin C. M. Fung, Guozhu Dong
INFOCOM
2007
IEEE
15 years 10 months ago
Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications
Abstract— Priority queues are essential for various network processing applications, including per-flow queueing with Quality-of-Service (QoS) guarantees, management of large fa...
Hao Wang, Bill Lin
SAC
2005
ACM
15 years 10 months ago
Adaptation point analysis for computation migration/checkpointing
Finding the appropriate location of adaptation points for computation migration/checkpointing is critical since the distance between two consecutive adaptation points determines t...
Yanqing Ji, Hai Jiang, Vipin Chaudhary
145
Voted
ISICT
2003
15 years 5 months ago
Analysis of a mobile communication security protocol
: Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle de...
Tom Coffey, Reiner Dojen
JCIT
2010
98views more  JCIT 2010»
14 years 11 months ago
Reliability Analysis of the MAP/M/c Queue with Server Breakdowns
We consider the MAP/M/c queue with markovian flow of breakdowns. There are K waiting positions for arrival customers in the system. The system we consider comprises c servers, of ...
Zonghao Zhou, Yijuan Zhu