Sciweavers

2941 search results - page 285 / 589
» Communication Performance Issues for Two Cluster Computers
Sort
View
IPPS
2005
IEEE
15 years 10 months ago
On the Optimal Placement of Secure Data Objects over Internet
Secret sharing algorithms have been used for intrusion tolerance, which ensure the confidentiality, integrity and availability of critical information. However, dynamically changi...
Manghui Tu, Peng Li, Qingkai Ma, I-Ling Yen, Farok...
IPPS
2002
IEEE
15 years 10 months ago
A Comparative Study of Parallel and Distributed Java Projects for Heterogeneous Systems
During the last few years, the concepts of cluster computing and heterogeneous networked systems have received increasing interest. The popularity of using Java for developing par...
Jameela Al-Jaroodi, Nader Mohamed, Hong Jiang, Dav...
ADHOC
2010
292views more  ADHOC 2010»
15 years 5 months ago
Sleep/wake scheduling for multi-hop sensor networks: Non-convexity and approximation algorithm
We investigate the problem of sleep/wake scheduling for low duty cycle sensor networks. Our work differs from prior work in that we explicitly consider the effect of synchronizati...
Yan Wu, Sonia Fahmy, Ness B. Shroff
122
Voted
ICCCN
2007
IEEE
15 years 11 months ago
Evaluating Xen for Router Virtualization
— In this paper, we evaluate the performance of a software IP router forwarding plane inside the Xen virtual machine monitor environment with a view to identifying (some) design ...
Norbert Egi, Adam Greenhalgh, Mark Handley, Micka&...
TPDS
2010
256views more  TPDS 2010»
15 years 3 months ago
Privacy-Conscious Location-Based Queries in Mobile Environments
— In location-based services, users with location-aware mobile devices are able to make queries about their surroundings anywhere and at any time. While this ubiquitous computing...
Jianliang Xu, Xueyan Tang, Haibo Hu, Jing Du