Sciweavers

3181 search results - page 484 / 637
» Automated Deployment Support for Parallel Distributed Comput...
Sort
View
128
Voted
SRDS
2008
IEEE
15 years 9 months ago
An Empirical Study of Denial of Service Mitigation Techniques
We present an empirical study of the resistance of several protocols to denial of service (DoS) attacks on client-server communication. We show that protocols that use authenticat...
Gal Badishi, Amir Herzberg, Idit Keidar, Oleg Roma...
124
Voted
DCOSS
2007
Springer
15 years 9 months ago
Localization for Anchoritic Sensor Networks
We introduce a class of anchoritic sensor networks, where communications between sensor nodes are undesirable or infeasible due to, e.g., harsh environments, energy constraints, or...
Yuliy M. Baryshnikov, Jian Tan
134
Voted
ICPADS
2006
IEEE
15 years 9 months ago
Accuracy versus Migration Overhead in Real-Time Multiprocessor Reweighting Algorithms
We consider schemes for enacting task share changes—a process called reweighting—on real-time multiprocessor platforms. Our particular focus is reweighting schemes that are de...
Aaron Block, James H. Anderson
123
Voted
ISPA
2005
Springer
15 years 8 months ago
FleMA: A Flexible Measurement Architecture for ChinaGrid
Grid technologies are becoming more and more mature in recent years. In contrast to this trend, the resource measurement landscape in Grids looks rather dismal. As part of ChinaGri...
Weimin Zheng, Meizhi Hu, Lin Liu, Yongwei Wu, Jing...
130
Voted
CLUSTER
2009
IEEE
15 years 6 months ago
Using a cluster as a memory resource: A fast and large virtual memory on MPI
—The 64-bit OS provides ample memory address space that is beneficial for applications using a large amount of data. This paper proposes using a cluster as a memory resource for...
Hiroko Midorikawa, Kazuhiro Saito, Mitsuhisa Sato,...