Sciweavers

1777 search results - page 171 / 356
» Programming Cryptographic Protocols
Sort
View
IPPS
2010
IEEE
14 years 11 months ago
Dynamic analysis of the relay cache-coherence protocol for distributed transactional memory
Transactional memory is an alternative programming model for managing contention in accessing shared in-memory data objects. Distributed transactional memory (TM) promises to alle...
Bo Zhang, Binoy Ravindran
EMSOFT
2006
Springer
15 years 5 months ago
Analysis of the zeroconf protocol using UPPAAL
We report on a case study in which the model checker Uppaal is used to formally model parts of Zeroconf, a protocol for dynamic configuration of IPv4 link-local addresses that has...
Biniam Gebremichael, Frits W. Vaandrager, Miaomiao...
PPOPP
2003
ACM
15 years 6 months ago
Automated application-level checkpointing of MPI programs
Because of increasing hardware and software complexity, the running time of many computational science applications is now more than the mean-time-to-failure of highpeformance com...
Greg Bronevetsky, Daniel Marques, Keshav Pingali, ...
SC
2000
ACM
15 years 5 months ago
MPICH-GQ: Quality-of-Service for Message Passing Programs
Parallel programmers typically assume that all resources required for a program’s execution are dedicated to that purpose. However, in local and wide area networks, contention f...
Alain J. Roy, Ian T. Foster, William Gropp, Nichol...
AI
2008
Springer
15 years 1 months ago
Robust artificial life via artificial programmed death
We propose a novel approach to self-regenerating continuously-operating systems. Such systems provide best-case solutions in security surveillance or decision making centers. We i...
M. M. Olsen, N. Siegelmann-Danieli, Hava T. Siegel...