Sciweavers

404 search results - page 53 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
141
Voted
CLUSTER
2004
IEEE
15 years 7 months ago
Improved message logging versus improved coordinated checkpointing for fault tolerant MPI
Fault tolerance is a very important concern for critical high performance applications using the MPI library. Several protocols provide automatic and transparent fault detection a...
Pierre Lemarinier, Aurelien Bouteiller, Thomas H&e...
143
Voted
DSN
2004
IEEE
15 years 7 months ago
Diverse Firewall Design
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
Alex X. Liu, Mohamed G. Gouda
147
Voted
IANDC
2011
129views more  IANDC 2011»
14 years 10 months ago
Rigid tree automata and applications
We introduce the class of Rigid Tree Automata (RTA), an extension of standard bottom-up automata on ranked trees with distinguished states called rigid. Rigid states define a res...
Florent Jacquemard, Francis Klay, Camille Vacher
139
Voted
WOWMOM
2009
ACM
167views Multimedia» more  WOWMOM 2009»
15 years 10 months ago
Bio-inspired link quality estimation for wireless mesh networks
—In this paper, the problem of estimating the link quality in mesh networks has been considered. Such a process is a major task to develop an efficient network layer, since it a...
Marcello Caleffi, Luigi Paura
125
Voted
SIMUTOOLS
2008
15 years 4 months ago
Simulation of ad hoc networks: ns-2 compared to JiST/SWANS
For the evaluation of ad hoc network protocols, researchers traditionally use simulations because they easily allow for a large number of nodes and reproducible environment condit...
Elmar Schoch, Michael Feiri, Frank Kargl, Michael ...