Sciweavers

231 search results - page 31 / 47
» Performance Prediction of J2EE Applications Using Messaging ...
Sort
View
JUCS
2008
156views more  JUCS 2008»
14 years 11 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
IPPS
2007
IEEE
15 years 6 months ago
Low-Overhead LogGP Parameter Assessment for Modern Interconnection Networks
Network performance measurement and prediction is very important to predict the running time of high performance computing applications. The LogP model family has been proven to b...
Torsten Hoefler, Andre Lichei, Wolfgang Rehm
CAINE
2008
15 years 1 months ago
Towards Multiservice Sensor Networks
Sensor networks have been used in many applications such as health monitoring, structural monitoring, transportation networks, weather prediction, and border security. In most of ...
Rabie Ramadan, Bilal I. AlQudah
LCPC
2007
Springer
15 years 5 months ago
Evaluation of RDMA Opportunities in an Object-Oriented DSM
Remote Direct Memory Access (RDMA) is a technology to update a remote machine’s memory without intervention at the receiver side. We evaluate where RDMA can be usefully applied a...
Ronald Veldema, Michael Philippsen
SIGCOMM
1998
ACM
15 years 3 months ago
Secure Group Communications Using Key Graphs
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group ...
Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam