Sciweavers

231 search results - page 15 / 47
» Performance Prediction of J2EE Applications Using Messaging ...
Sort
View
MICRO
2002
IEEE
131views Hardware» more  MICRO 2002»
14 years 11 months ago
Protocol Wrappers for Layered Network Packet Processing in Reconfigurable Hardware
abstracting the operation of lower-level packet processing functions. The library synthesizes into field-programmable gate array (FPGA) logic and is utilized in a network platform ...
Florian Braun, John W. Lockwood, Marcel Waldvogel
SC
2005
ACM
15 years 5 months ago
SCTP versus TCP for MPI
SCTP (Stream Control Transmission Protocol) is a recently standardized transport level protocol with several features that better support the communication requirements of paralle...
Humaira Kamal, Brad Penoff, Alan Wagner
JCS
2010
80views more  JCS 2010»
14 years 6 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
93
Voted
IPPS
2009
IEEE
15 years 6 months ago
Improving RDMA-based MPI eager protocol for frequently-used buffers
MPI is the main standard for communication in high-performance clusters. MPI implementations use the Eager protocol to transfer small messages. To avoid the cost of memory registr...
Mohammad J. Rashti, Ahmad Afsahi
98
Voted
NDSS
2008
IEEE
15 years 6 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...