Sciweavers

2663 search results - page 237 / 533
» The Design, Implementation, and Evaluation of Jade
Sort
View
IPPS
2007
IEEE
15 years 5 months ago
Securing Grid Data Transfer Services with Active Network Portals
Widely available and utilized Grid servers are vulnerable to a variety of threats from Denial of Service (DoS) attacks, overloading caused by flash crowds, and compromised client ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...
ITNG
2007
IEEE
15 years 5 months ago
Performance Analysis of Error Control Codes for Wireless Sensor Networks
In wireless sensor networks, the data transmitted from the sensor nodes are vulnerable to corruption by errors induced by noisy channels and other factors. Hence it is necessary t...
Gopinath Balakrishnan, Mei Yang, Yingtao Jiang, Yo...
71
Voted
HPCC
2007
Springer
15 years 5 months ago
A Windows-Based Parallel File System
Parallel file systems are widely used in clusters to provide high performance I/O. However, most of the existing parallel file systems are based on UNIX-like operating systems. W...
Lungpin Yeh, Juei-Ting Sun, Sheng-Kai Hung, Yarsun...
CNSR
2006
IEEE
132views Communications» more  CNSR 2006»
15 years 5 months ago
SCTP Multihoming Support for Handoffs across Heterogeneous Networks
Next-generation mobile terminals are expected to provide users with seamless, uninterrupted network connectivity while moving across wide geographic locations. Achieving continuou...
Farhan Siddiqui, Sherali Zeadally
ISCA
2006
IEEE
142views Hardware» more  ISCA 2006»
15 years 5 months ago
Bulk Disambiguation of Speculative Threads in Multiprocessors
Transactional Memory (TM), Thread-Level Speculation (TLS), and Checkpointed multiprocessors are three popular architectural techniques based on the execution of multiple, cooperat...
Luis Ceze, James Tuck, Josep Torrellas, Calin Casc...