Sciweavers

3330 search results - page 302 / 666
» software 2010
Sort
View
CORR
2010
Springer
173views Education» more  CORR 2010»
15 years 2 months ago
An Approach to Ad hoc Cloud Computing
We consider how underused computing resources within an enterprise may be harnessed to improve utilization and create an elastic computing infrastructure. Most current cloud provi...
Graham N. C. Kirby, Alan Dearle, Angus Macdonald, ...
GLOBECOM
2010
IEEE
15 years 1 months ago
Hybrid Window and Rate Based Congestion Control for Delay Sensitive Applications
There has been a dramatic increase in interactive cloud based software applications. Compared to classical realtime media applications (voice over IP (VoIP)/conferencing) and non r...
Sanjeev Mehrotra, Jin Li, Sudipta Sengupta, Manish...
TCOS
2010
14 years 10 months ago
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
Abstract. In [24] Raddum and Semaev propose a technique to solve systems of polynomial equations over F2 as occurring in algebraic attacks on block ciphers. This approach is known ...
Willi Geiselmann, Kenneth Matheis, Rainer Steinwan...
SIGSOFT
2010
ACM
15 years 1 months ago
Staged concurrent program analysis
Concurrent program verification is challenging because it involves exploring a large number of possible thread interleavings together with complex sequential reasoning. As a resul...
Nishant Sinha, Chao Wang
SIGSOFT
2010
ACM
15 years 1 months ago
Realizability analysis for message-based interactions using shared-state projections
The global interaction behavior in message-based systems can be specified as a finite-state machine defining acceptable sequences of messages exchanged by a group of peers. Realiz...
Sylvain Hallé, Tevfik Bultan