Sciweavers

1080 search results - page 172 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
RSA
2000
170views more  RSA 2000»
14 years 9 months ago
Delayed path coupling and generating random permutations
We analyze various stochastic processes for generating permutations almost uniformly at random in distributed and parallel systems. All our protocols are simple, elegant and are b...
Artur Czumaj, Miroslaw Kutylowski
ICDE
2005
IEEE
143views Database» more  ICDE 2005»
15 years 11 months ago
Postgres-R(SI): Combining Replica Control with Concurrency Control based on Snapshot Isolation
Replicating data over a cluster of workstations is a powerful tool to increase performance, and provide faulttolerance for demanding database applications. The big challenge in su...
Shuqing Wu, Bettina Kemme
IISWC
2009
IEEE
15 years 4 months ago
A communication characterisation of Splash-2 and Parsec
Recent benchmark suite releases such as Parsec specifically utilise the tightly coupled cores available in chipmultiprocessors to allow the use of newer, high performance, models ...
Nick Barrow-Williams, Christian Fensch, Simon Moor...
INFOCOM
2007
IEEE
15 years 4 months ago
Realistic Sensing Area Modeling
—Despite the well-known fact that sensing patterns in reality are highly irregular, researchers continue to develop protocols with simplifying assumptions about the sensing. For ...
Joengmin Hwang, Yu Gu, Tian He, Yongdae Kim
HPDC
2005
IEEE
15 years 3 months ago
411 on scalable password service
In this paper we present 411, a password distribution system for high performance environments that provides security and scalability. We show that existing solutions such as NIS ...
Federico D. Sacerdoti, Mason J. Katz, Philip M. Pa...