Sciweavers

379 search results - page 65 / 76
» Communication Abstractions for Distributed Business Processe...
Sort
View
78
Voted
PVM
2005
Springer
15 years 2 months ago
Implementing MPI-IO Shared File Pointers Without File System Support
Abstract. The ROMIO implementation of the MPI-IO standard provides a portable infrastructure for use on top of any number of different underlying storage targets. These targets va...
Robert Latham, Robert B. Ross, Rajeev Thakur, Bria...
MA
2000
Springer
115views Communications» more  MA 2000»
15 years 1 months ago
Quantitative Evaluation of Pairwise Interactions between Agents
Abstract. Systems comprised of multiple interacting mobile agents provide an alternate network computing paradigm that integrates remote data access, message exchange and migration...
Takahiro Kawamura, Sam Joseph, Akihiko Ohsuga, Shi...
89
Voted
PIMRC
2010
IEEE
14 years 7 months ago
Downlink capacity of two-tier cognitive femto networks
Abstract--In two-tier networks consisting of a macrocell overlaid with femtocells in co-channel deployment and closed-access policy, spatial reuse is achieved at the price of sever...
Shin-Ming Cheng, Weng-Chon Ao, Kwang-Cheng Chen
JNW
2008
83views more  JNW 2008»
14 years 9 months ago
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest secur...
Elankayer Sithirasenan, Vallipuram Muthukkumarasam...
INFOCOM
2009
IEEE
15 years 4 months ago
Time Valid One-Time Signature for Time-Critical Multicast Data Authentication
Abstract—It is challenging to provide authentication to timecritical multicast data, where low end-to-end delay is of crucial importance. Consequently, it requires not only effi...
Qiyan Wang, Himanshu Khurana, Ying Huang, Klara Na...