Sciweavers

688 search results - page 90 / 138
» Network Coding Protocols for Secret Key Distribution
Sort
View
ISPDC
2005
IEEE
15 years 10 months ago
On the Implementation and Evaluation of Berkeley Sockets on Maestro2 cluster computing environment
The support on cluster environments of ”legacy protocols” is important to avoid rewriting the code of applications, but this support should not prevent to achieve the maximum ...
Ricardo Guapo, Leonel Sousa, Shinichi Yamagiwa
HPCN
1998
Springer
15 years 8 months ago
PARAFLOW: A Dataflow Distributed Data-Computing System
We describe the Paraflow system for connecting heterogeneous computing services together into a flexible and efficient data-mining metacomputer. There are three levels of parallel...
Roy Williams, Bruce Sears
137
Voted
TON
2010
80views more  TON 2010»
15 years 3 months ago
Replication routing in DTNs: a resource allocation approach
—Routing protocols for disruption-tolerant networks (DTNs) use a variety of mechanisms, including discovering the meeting probabilities among nodes, packet replication, and netwo...
Aruna Balasubramanian, Brian Neil Levine, Arun Ven...
KIVS
2005
Springer
15 years 10 months ago
Making Chord go mobile
: The Chord protocol is a structured Peer-to-Peer (P2P) protocol based on distributed hash tables (DHT). By using hash keys to identify the nodes in the network and also the shared...
Stefan Zöls, Rüdiger Schollmeier, Wolfga...
OTM
2009
Springer
15 years 11 months ago
Evaluating Transport Protocols for Real-Time Event Stream Processing Middleware and Applications
Real-time event stream processing (RT-ESP) applications must synchronize continuous data streams despite fluctuations in resource availability. Satisfying these needs of RT-ESP ap...
Joe Hoffert, Douglas C. Schmidt, Aniruddha S. Gokh...