Sciweavers

5448 search results - page 894 / 1090
» Breakpoints and Time in Distributed Computations
Sort
View
ADHOCNETS
2010
Springer
15 years 25 days ago
Guaranteeing Reliable Communications in Mesh Beacon-Enabled IEEE802.15.4 WSN for Industrial Monitoring Applications
Wireless Sensor Networks (WSN) are a very promising solution for industrial monitoring applications in terms of safety, costs, efficiency and productivity. However, in order to mov...
Berta Carballido Villaverde, Susan Rea, Dirk Pesch
AINA
2011
IEEE
14 years 7 months ago
Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence
—The advent of distributed and ad-hoc-connected systems such as in Ambient Intelligence applications confronts developers with the question on how to specify QoS- and security po...
Julian Schütte, Stephan Heuser
HPCA
2005
IEEE
16 years 4 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
HPCA
2003
IEEE
16 years 4 months ago
Hierarchical Backoff Locks for Nonuniform Communication Architectures
This paper identifies node affinity as an important property for scalable general-purpose locks. Nonuniform communication architectures (NUCAs), for example CCNUMAs built from a f...
Zoran Radovic, Erik Hagersten
PPOPP
2010
ACM
16 years 1 months ago
Leveraging parallel nesting in transactional memory
Exploiting the emerging reality of affordable multi-core architeces through providing programmers with simple abstractions that would enable them to easily turn their sequential p...
João Barreto, Aleksandar Dragojevic, Paulo ...