Sciweavers

2468 search results - page 378 / 494
» On Model Checking Techniques for Randomized Distributed Syst...
Sort
View
136
Voted
JSAC
2006
181views more  JSAC 2006»
15 years 3 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu
193
Voted
GCC
2010
Springer
15 years 1 months ago
DFC: Towards Effective Feedback Flow Management for Datacenters
Quality of Service (QoS) is essential to datacenters, which requires effective schemes to manage the flows among numerous servers. However, existing management techniques mainly fo...
Baohua Yang, Guodong Li, Yaxuan Qi, Yibo Xue, Jun ...
IPPS
2006
IEEE
15 years 9 months ago
A method to improve structural modeling based on conserved domain clusters
—Homology modeling requires an accurate alignment between a query sequence and its homologs with known three-dimensional (3D) information. Current structural modeling techniques ...
Fa Zhang, Lin Xu, Bo Yuan
KBSE
2005
IEEE
15 years 9 months ago
Secure sharing between untrusted users in a transparent source/binary deployment model
The Nix software deployment system is based on the paradigm of transparent source/binary deployment: distributors deploy descriptors that build components from source, while clien...
Eelco Dolstra
ISCA
2010
IEEE
240views Hardware» more  ISCA 2010»
15 years 8 months ago
Modeling critical sections in Amdahl's law and its implications for multicore design
This paper presents a fundamental law for parallel performance: it shows that parallel performance is not only limited by sequential code (as suggested by Amdahl’s law) but is a...
Stijn Eyerman, Lieven Eeckhout