Sciweavers

684 search results - page 93 / 137
» Memory Access Characteristics of Network Infrastructure Appl...
Sort
View
HPCA
1998
IEEE
15 years 2 months ago
Exploiting Two-Case Delivery for Fast Protected Messaging
We propose and evaluate two complementary techniques to protect and virtualize a tightly-coupled network interface in a multicomputer. The techniques allow efficient, direct appli...
Kenneth Mackenzie, John Kubiatowicz, Matthew Frank...
MA
2000
Springer
115views Communications» more  MA 2000»
15 years 1 months ago
Quantitative Evaluation of Pairwise Interactions between Agents
Abstract. Systems comprised of multiple interacting mobile agents provide an alternate network computing paradigm that integrates remote data access, message exchange and migration...
Takahiro Kawamura, Sam Joseph, Akihiko Ohsuga, Shi...
COMCOM
2008
147views more  COMCOM 2008»
14 years 9 months ago
Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems
A new kind of ad hoc network is hitting the streets: Vehicular Ad Hoc Networks (VANets). In these networks, vehicles communicate with each other and possibly with a roadside infra...
Azzedine Boukerche, Horacio A. B. F. de Oliveira, ...
IPPS
2008
IEEE
15 years 4 months ago
SNAP, Small-world Network Analysis and Partitioning: An open-source parallel graph framework for the exploration of large-scale
We present SNAP (Small-world Network Analysis and Partitioning), an open-source graph framework for exploratory study and partitioning of large-scale networks. To illustrate the c...
David A. Bader, Kamesh Madduri
ICPPW
2009
IEEE
15 years 4 months ago
Audio-Based Self-Organizing Authentication for Pervasive Computing: A Cyber-Physical Approach
—Pervasive computing is fast becoming a reality with rapid advance in computing and networking technologies. It has the characteristics of scalability, invisibility, and the abse...
Su Jin Kim, Sandeep K. S. Gupta