Sciweavers

3737 search results - page 306 / 748
» Parallel Distributed Belief Networks
Sort
View
DCOSS
2006
Springer
15 years 8 months ago
Locating Compromised Sensor Nodes Through Incremental Hashing Authentication
Abstract. While sensor networks have recently emerged as a promising computing model, they are vulnerable to various node compromising attacks. In this paper, we propose COOL, a CO...
Youtao Zhang, Jun Yang 0002, Lingling Jin, Weijia ...
GPC
2009
Springer
15 years 2 months ago
I/O Device Virtualization in the Multi-core era, a QoS Perspective
In this paper, we propose an extension to the I/O device architecture, as recommended in the PCI-SIG IOV specification, for virtualizing network I/O devices. The aim is to enable ...
J. Lakshmi, S. K. Nandy
IPPS
2007
IEEE
15 years 11 months ago
Using Linearization for Global Consistency in SSR
Novel routing algorithms such as scalable source routing (SSR) and virtual ring routing (VRR) need to set up and maintain a virtual ring structure among all the nodes in the netwo...
Kendy Kutzner, Thomas Fuhrmann
ICPP
1998
IEEE
15 years 9 months ago
Efficient Multicast on Myrinet using Link-Level Flow Control
This paper studies the implementation of efficient multicast protocols for Myrinet, a switched, wormhole-routed, Gigabit-per-second network technology. Since Myrinet does not supp...
Raoul Bhoedjang, Tim Rühl, Henri E. Bal
IPPS
1998
IEEE
15 years 9 months ago
Multiprocessor Scheduling Using Mean-Field Annealing
This paper presents our work on the static task scheduling model using the mean-field annealing (MFA) technique. Mean-field annealing is a technique of thermostatic annealing that...
Shaharuddin Salleh, Albert Y. Zomaya