Sciweavers

6014 search results - page 1022 / 1203
» Trends in High Performance Computing
Sort
View
IJHPCA
2008
96views more  IJHPCA 2008»
15 years 4 months ago
BlueGene/L applications: Parallelism On a Massive Scale
pc.sagepub.com/cgi/content/abstract/22/1/33 The online version of this article can be found at: Published by: http://www.sagepublications.com can be found at:International Journal ...
Bronis R. de Supinski, Martin Schulz, Vasily Bulat...
CN
2007
148views more  CN 2007»
15 years 4 months ago
Using taxonomies for content-based routing with ants
Although the ant metaphor has been successfully applied to routing of data packets both in wireless and fixed networks, little is known yet about its appropriateness for search i...
Elke Michlmayr, Arno Pany, Gerti Kappel
135
Voted
COMCOM
2007
84views more  COMCOM 2007»
15 years 4 months ago
A genetic approach for adding QoS to distributed virtual environments
Distributed Virtual Environment (DVE) systems have been designed last years as a set of distributed servers. These systems allow a large number of remote users to share a single 3...
Silvia Rueda, Pedro Morillo, Juan M. Orduña...
IJNSEC
2006
78views more  IJNSEC 2006»
15 years 4 months ago
Authentication and Key Agreement Protocols Preserving Anonymity
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication an...
Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu
JSAC
2006
127views more  JSAC 2006»
15 years 4 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
« Prev « First page 1022 / 1203 Last » Next »