Sciweavers

3031 search results - page 288 / 607
» SNMS - Shadow Network Management System
Sort
View
COREGRID
2007
Springer
15 years 11 months ago
Co-Allocating Compute and Network Resources
Distributed applications or workflows need to access and use compute, storage and network resources simultaneously or chronologically coordinated respectively. Examples are distri...
Thomas Eickermann, Lidia Westphal, Oliver Wäl...
122
Voted
MICRO
2006
IEEE
155views Hardware» more  MICRO 2006»
15 years 11 months ago
In-Network Cache Coherence
With the trend towards increasing number of processor cores in future chip architectures, scalable directory-based protocols for maintaining cache coherence will be needed. Howeve...
Noel Eisley, Li-Shiuan Peh, Li Shang
141
Voted
ICDCSW
2002
IEEE
15 years 10 months ago
Quantifying Effect of Network Latency and Clock Drift on Time-Driven Key Sequencing
Time-driven Key Sequencing (TKS) is a key management technique that synchronizes the session key used by a set of communicating principals based on time of day. This relatively lo...
Geoffrey G. Xie, Cynthia E. Irvine, Timothy E. Lev...
129
Voted
CDC
2009
IEEE
135views Control Systems» more  CDC 2009»
15 years 9 months ago
Trust Estimation in autonomic networks: a statistical mechanics approach
— Trust management, broadly intended as the ability to maintain belief relationship among entities, is recognized as a fundamental security challenge for autonomous and selforgan...
Stefano Ermon, Luca Schenato, Sandro Zampieri
VRST
1999
ACM
15 years 9 months ago
Patterns of network and user activity in an inhabited television event
Inhabited Television takes traditional broadcast television and combines it with multiuser virtual reality, to give new possibilities for interaction and participation in and arou...
Chris Greenhalgh, Steve Benford, Michael P. Craven