Sciweavers

1296 search results - page 50 / 260
» Exploiting communication concurrency on high performance com...
Sort
View
89
Voted
MOBIHOC
2003
ACM
15 years 4 months ago
PAN: providing reliable storage in mobile ad hoc networks with probabilistic quorum systems
Reliable storage of data with concurrent read/write accesses (or query/update) is an ever recurring issue in distributed settings. In mobile ad hoc networks, the problem becomes e...
Jun Luo, Jean-Pierre Hubaux, Patrick Th. Eugster
EUROSYS
2008
ACM
15 years 8 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
WETICE
2009
IEEE
15 years 5 months ago
PerfCloud: GRID Services for Performance-Oriented Development of Cloud Computing Applications
—Cloud Computing, born in the e-business context, and GRID computing, originated in the e-science context, are two different but similar paradigms for managing large sets of dist...
Emilio Pasquale Mancini, Massimiliano Rak, Umberto...
SIGCOMM
2012
ACM
13 years 1 months ago
Picasso: flexible RF and spectrum slicing
This paper presents the design, implementation and evaluation of Picasso, a novel radio design that allows simultaneous transmission and reception on separate and arbitrary spectr...
Steven Siying Hong, Jeffrey Mehlman, Sachin Rajsek...
RTSS
2009
IEEE
15 years 5 months ago
Timing Analysis of Concurrent Programs Running on Shared Cache Multi-Cores
—Memory accesses form an important source of timing unpredictability. Timing analysis of real-time embedded software thus requires bounding the time for memory accesses. Multipro...
Yan Li, Vivy Suhendra, Yun Liang, Tulika Mitra, Ab...