Sciweavers

10625 search results - page 1747 / 2125
» Supporting delay-intolerant applications
Sort
View
P2P
2008
IEEE
15 years 6 months ago
Peer-to-Peer Secure Multi-party Numerical Computation
We propose an efficient framework for enabling secure multi-party numerical computations in a Peer-to-Peer network. This problem arises in a range of applications such as collabo...
Danny Bickson, Danny Dolev, Genia Bezman, Benny Pi...
PDP
2008
IEEE
15 years 6 months ago
System-Level Virtualization for High Performance Computing
System-level virtualization has been a research topic since the 70’s but regained popularity during the past few years because of the availability of efficient solution such as...
Geoffroy Vallée, Thomas Naughton, Christian...
ICC
2007
IEEE
193views Communications» more  ICC 2007»
15 years 6 months ago
A Semantic Context Model for Location-Based Cooperative Mobile Computing
—This paper addresses context issues in pervasive mobile computing and presents a semantic context model to support location based cooperative mobile applications. In this paper,...
Bin Hu, Philip Moore, Hsiai-Hwa Chen
ICNP
2007
IEEE
15 years 6 months ago
PSM-throttling: Minimizing Energy Consumption for Bulk Data Communications in WLANs
— While the 802.11 power saving mode (PSM) and its enhancements can reduce power consumption by putting the wireless network interface (WNI) into sleep as much as possible, they ...
Enhua Tan, Lei Guo, Songqing Chen, Xiaodong Zhang
CCS
2007
ACM
15 years 5 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...
« Prev « First page 1747 / 2125 Last » Next »