Sciweavers

404 search results - page 27 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
150
Voted
MOBIHOC
2007
ACM
16 years 3 months ago
Surviving attacks on disruption-tolerant networks without authentication
Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN ...
John Burgess, George Dean Bissias, Mark D. Corner,...
142
Voted
IJHPCA
2006
117views more  IJHPCA 2006»
15 years 3 months ago
MPICH-V Project: A Multiprotocol Automatic Fault-Tolerant MPI
Abstract-- High performance computing platforms like Clusters, Grid and Desktop Grids are becoming larger and subject to more frequent failures. MPI is one of the most used message...
Aurelien Bouteiller, Thomas Hérault, G&eacu...
160
Voted
MONET
2002
185views more  MONET 2002»
15 years 3 months ago
An Adaptive Generalized Transmission Protocol for Ad Hoc Networks
Wireless networking and group communication in combination allows groups of dispersed mobile users to collaborate. This paper presents AGENT, a medium access control (MAC) protocol...
Andrew D. Myers, Gergely V. Záruba, Violet ...
148
Voted
MSR
2011
ACM
14 years 6 months ago
Security versus performance bugs: a case study on Firefox
A good understanding of the impact of different types of bugs on various project aspects is essential to improve software quality research and practice. For instance, we would ex...
Shahed Zaman, Bram Adams, Ahmed E. Hassan
121
Voted
ACSC
2004
IEEE
15 years 7 months ago
Homeless and Home-based Lazy Release Consistency Protocols on Distributed Shared Memory
This paper describes the comparison between homeless and home-based Lazy Release Consistency (LRC) protocols which are used to implement Distributed Shared Memory (DSM) in cluster...
Byung-Hyun Yu, Zhiyi Huang, Stephen Cranefield, Ma...