Sciweavers

6907 search results - page 275 / 1382
» Securing distributed adaptation
Sort
View
ISPAN
2005
IEEE
15 years 10 months ago
Using Predictive Adaptive Parallelism to Address Portability and Irregularity
A semi-dynamic system is presented that is capable of predicting the performance of parallel programs at runtime. The functionality given by the system allows for efficient handl...
David Wangerin, Isaac D. Scherson
HPDC
2002
IEEE
15 years 9 months ago
A Decentralized, Adaptive Replica Location Mechanism
We describe a decentralized, adaptive mechanism for replica location in wide-area distributed systems. Unlike traditional, hierarchical (e.g, DNS) and more recent (e.g., CAN, Chor...
Matei Ripeanu, Ian T. Foster
NIPS
2008
15 years 6 months ago
Domain Adaptation with Multiple Sources
This paper presents a theoretical analysis of the problem of domain adaptation with multiple sources. For each source domain, the distribution over the input points as well as a h...
Yishay Mansour, Mehryar Mohri, Afshin Rostamizadeh
113
Voted
ICDCS
2008
IEEE
15 years 11 months ago
Securing Wireless Data Networks against Eavesdropping using Smart Antennas
In this paper, we focus on securing communication over wireless data networks from malicious eavesdroppers, using smart antennas. While conventional cryptography based approaches ...
Sriram Lakshmanan, Cheng-Lin Tsao, Raghupathy Siva...
ASWEC
2006
IEEE
15 years 10 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge