Sciweavers

1630 search results - page 196 / 326
» Secure Overlay Network Design
Sort
View
122
Voted
VLDB
2004
ACM
138views Database» more  VLDB 2004»
15 years 8 months ago
Towards an Internet-Scale XML Dissemination Service
Publish/subscribe systems have demonstrated the ability to scale to large numbers of users and high data rates when providing content-based data dissemination services on the Inte...
Yanlei Diao, Shariq Rizvi, Michael J. Franklin
APPT
2009
Springer
15 years 6 months ago
MaGate Simulator: A Simulation Environment for a Decentralized Grid Scheduler
Abstract. This paper presents a simulator for of a decentralized modular grid scheduler named MaGate. MaGate’s design emphasizes scheduler interoperability by providing intellige...
Ye Huang, Amos Brocco, Michèle Courant, B&e...
CORR
2007
Springer
143views Education» more  CORR 2007»
15 years 3 months ago
On Myopic Sensing for Multi-Channel Opportunistic Access
We consider a multi-channel opportunistic communication system where the states of these channels evolve as independent and statistically identical Markov chains (the Gilbert-Elli...
Qing Zhao, Bhaskar Krishnamachari, Keqin Liu
HIPC
2009
Springer
15 years 1 months ago
Group file operations for scalable tools and middleware
Group file operations are a new, intuitive idiom for tools and middleware - including parallel debuggers and runtimes, performance measurement and steering, and distributed resourc...
Michael J. Brim, Barton P. Miller
PERCOM
2007
ACM
16 years 2 months ago
Towards an Open Source Toolkit for Ubiquitous Device Authentication
Most authentication protocols designed for ubiquitous computing environments try to solve the problem of intuitive, scalable, secure authentication of wireless communication. Due ...
Rene Mayrhofer