Sciweavers

7992 search results - page 1317 / 1599
» Communication Abstractions for Distributed Systems
Sort
View
ICC
2007
IEEE
186views Communications» more  ICC 2007»
15 years 11 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
162
Voted
ICA3PP
2010
Springer
15 years 9 months ago
InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services
Abstract. Cloud computing providers have setup several data centers at different geographical locations over the Internet in order to optimally serve needs of their customers aroun...
Rajkumar Buyya, Rajiv Ranjan, Rodrigo N. Calheiros
IPPS
2008
IEEE
15 years 11 months ago
High-speed string searching against large dictionaries on the Cell/B.E. Processor
Our digital universe is growing, creating exploding amounts of data which need to be searched, protected and filtered. String searching is at the core of the tools we use to curb...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...
INFOCOM
2007
IEEE
15 years 11 months ago
Residual-Based Measurement of Peer and Link Lifetimes in Gnutella Networks
—Existing methods of measuring lifetimes in P2P systems usually rely on the so-called Create-Based Method (CBM) [16], which divides a given observation window into two halves and...
Xiaoming Wang, Zhongmei Yao, Dmitri Loguinov
ICS
2007
Tsinghua U.
15 years 11 months ago
A study of process arrival patterns for MPI collective operations
Process arrival pattern, which denotes the timing when different processes arrive at an MPI collective operation, can have a significant impact on the performance of the operatio...
Ahmad Faraj, Pitch Patarasuk, Xin Yuan
« Prev « First page 1317 / 1599 Last » Next »