Sciweavers

1656 search results - page 247 / 332
» Building Dependable Distributed Applications Using AQUA
Sort
View
ACSD
2003
IEEE
125views Hardware» more  ACSD 2003»
15 years 5 months ago
Modelling a Secure, Mobile, and Transactional System with CO-OPN
Modelling complex concurrent systems is often difficult and error-prone, in particular when new concepts coming from advanced practical applications are considered. These new appl...
Didier Buchs, Stanislav Chachkov, David Hurzeler
ICDCSW
2002
IEEE
15 years 4 months ago
Behavior and Performance of Message-Oriented Middleware Systems
The middleware technology used as the foundation of Internet-enabled enterprise systems is becoming increasingly complex. In addition, the various technologies offer a number of s...
Phong Tran, Paul Greenfield, Ian Gorton
EURONGI
2006
Springer
15 years 3 months ago
The Challenges of Merging Two Similar Structured Overlays: A Tale of Two Networks
Structured overlay networks is an important and interesting primitive that can be used by diverse peer-to-peer applications. Multiple overlays can result either because of network ...
Anwitaman Datta, Karl Aberer
TC
2008
14 years 11 months ago
Cryptanalysis with COPACOBANA
Cryptanalysis of ciphers usually involves massive computations. The security parameters of cryptographic algorithms are commonly chosen so that attacks are infeasible with availabl...
Tim Güneysu, Timo Kasper, Martin Novotn&yacut...
ICS
2007
Tsinghua U.
15 years 6 months ago
Optimization and bottleneck analysis of network block I/O in commodity storage systems
Building commodity networked storage systems is an important architectural trend; Commodity servers hosting a moderate number of consumer-grade disks and interconnected with a hig...
Manolis Marazakis, Vassilis Papaefstathiou, Angelo...