Sciweavers

448 search results - page 31 / 90
» Implementation and Performance Evaluation of the re-ECN Prot...
Sort
View
JAMIA
2011
68views more  JAMIA 2011»
14 years 19 days ago
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance
Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality h...
Khaled El Emam, Jun Hu, Jay Mercer, Liam Peyton, M...
HPCA
2000
IEEE
15 years 2 months ago
Improving the Throughput of Synchronization by Insertion of Delays
Efficiency of synchronization mechanisms can limit the parallel performance of many shared-memory applications. In addition, the ever increasing performance gap between processor...
Ravi Rajwar, Alain Kägi, James R. Goodman
TSE
1998
112views more  TSE 1998»
14 years 9 months ago
Message Logging: Pessimistic, Optimistic, Causal, and Optimal
Message-logging protocols are an integral part of a popular technique for implementing processes that can recover from crash failures. All message-logging protocols require that, ...
Lorenzo Alvisi, Keith Marzullo
ICDCSW
2011
IEEE
13 years 9 months ago
SenSec: A Scalable and Accurate Framework for Wireless Sensor Network Security Evaluation
—Developing secure wireless sensor networks (WSNs) is a complex process that involves careful design of attack test cases and security countermeasures, as well as meaningful eval...
Yi-Tao Wang, Rajive Bagrodia
ICAS
2008
IEEE
197views Robotics» more  ICAS 2008»
15 years 4 months ago
A Distributed and Autonomic Virtual Network Mapping Framework
This paper addresses the challenge of assigning virtual networks, through network virtualisation, to the underlying physical network in a distributed and efficient manner. The pa...
Ines Houidi, Wajdi Louati, Djamal Zeghlache