Sciweavers

1748 search results - page 64 / 350
» Security Models for Heterogeneous Networking
Sort
View
131
Voted
HCW
1998
IEEE
15 years 7 months ago
Dynamic, Competitive Scheduling of Multiple DAGs in a Distributed Heterogeneous Environment
With the advent of large scale heterogeneous environments, there is a need for matching and scheduling algorithms which can allow multiple DAG-structured applications to share the...
Michael A. Iverson, Füsun Özgüner
SUTC
2006
IEEE
15 years 9 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
122
Voted
NDSS
2005
IEEE
15 years 9 months ago
Rekeying and Storage Cost for Multiple User Revocation
In this paper, we focus on tradeoffs between storage cost and rekeying cost for secure multicast. Specifically, we present a family of algorithms that provide a tradeoff betwee...
Sandeep S. Kulkarni, Bezawada Bruhadeshwar
116
Voted
IPPS
2003
IEEE
15 years 8 months ago
Natural Block Data Decomposition for Heterogeneous Clusters
We propose general purposes natural heuristics for static block and block-cyclic heterogeneous data decomposition over processes of parallel program mapped into multidimensional g...
Egor Dovolnov, Alexey Kalinov, Sergey Klimov
IPPS
1999
IEEE
15 years 7 months ago
Dynamic Application Structuring on Heterogeneous, Distributed Systems
The diversity of computers and networks within a distributed system makes these systems highly heterogeneous. System heterogeneity complicates the design of static applications tha...
Saurav Chatterjee