Sciweavers

393 search results - page 40 / 79
» Distributed, parallel simulation of multiple, deliberative a...
Sort
View
ICPADS
2007
IEEE
15 years 4 months ago
S/Kademlia: A practicable approach towards secure key-based routing
Security is a common problem in completely decentralized peer-to-peer systems. Although several suggestions exist on how to create a secure key-based routing protocol, a practicab...
Ingmar Baumgart, Sebastian Mies
JCSS
2008
159views more  JCSS 2008»
14 years 9 months ago
Analysing distributed Internet worm attacks using continuous state-space approximation of process algebra models
Internet worms are classically described using SIR models and simulations, to capture the massive dynamics of the system. Here we are able to generate a differential equation-base...
Jeremy T. Bradley, Stephen T. Gilmore, Jane Hillst...
82
Voted
HPCA
2005
IEEE
15 years 10 months ago
Improving Multiple-CMP Systems Using Token Coherence
Improvements in semiconductor technology now enable Chip Multiprocessors (CMPs). As many future computer systems will use one or more CMPs and support shared memory, such systems ...
Michael R. Marty, Jesse D. Bingham, Mark D. Hill, ...
73
Voted
IPPS
2010
IEEE
14 years 7 months ago
Decentralized resource management for multi-core desktop grids
The majority of CPUs now sold contain multiple computing cores. However, current desktop grid computing systems either ignore the multiplicity of cores, or treat them as distinct,...
Jaehwan Lee, Peter J. Keleher, Alan Sussman
ICPP
2005
IEEE
15 years 3 months ago
VLAN-Based Minimal Paths in PC Cluster with Ethernet on Mesh and Torus
In a PC cluster with Ethernet, well-distributed multiple paths among hosts can be obtained by applying VLAN technology. In this paper, we propose VLAN topology sets and path assig...
Tomohiro Otsuka, Michihiro Koibuchi, Akiya Jouraku...