Showing 141 - 160 of 1,426

141

The CONNECT Architecture
Grace, Paul ; Georgantas, Nikolaos ; Bennaceur, Amel ; et al.
Marco Bernardo and Valerie Issarny. 11th International School on Formal Methods for the Design of Computer. :27-52

Interoperability emergent middleware modelling synthesis middleware protocol
Book
Save to List
142

Global Memory Access Modelling for Efficient Implementation of the Lattice Boltzmann Method on Graphics Processing Units
Obrecht, Christian ; Kuznik, Frédéric ; Tourancheau, Bernard ; et al.
VECPAR. :151-161

Porto, Portugal GPU computing CUDA lattice Boltzmann method CFD ACM: J.: Computer Applic...
Conference
Save to List
143

Efficient Placement of Light Splitters for Heterogeneous Multicast Traffic in Optical Networks
Jawhar, Shadi ; Cousin, Bernard ; Lahoud, Samer ; et al.
High Capacity Optical Networks and Enabling Technologies (HONET). :204-209

Le Caire, Egypt Optical networks Light splitter placement Multicast routing ACM: C.: Computer System... C.2: COMPUTER-COMMUNICAT...
Conference
Save to List
144

Low-Cost Secret-Sharing in Sensor Networks
Bertier, Marin ; Mostefaoui, Achour ; Tredan, Gilles ; et al.
12th IEEE International High Assurance Systems Engineering Symposium (HASE 2010). :1-9

San Jose, CA, United Sta... Wireless communication Distributed algorithm Malicious behavior Reliability Resiliency
Conference
Save to List
145

Fast Packet Recovery for PULL-Based P2P Live Streaming Systems
Wehbe, Houssein ; Babonneau, Gérard ; Cousin, Bernard ; et al.
Second International Conference on Advances in P2P Systems (AP2PS 2010). :20-25

Florance, Italy Peer-to-peer network video streaming packet loss packet recovery packet retransmission
Conference
Save to List
146

Time-Free Authenticated Byzantine Consensus
Moumen, Hamouma ; Mostefaoui, Achour ; Département d'Informatique [Université de Béjaïa] ; et al.
10th IEEE International Symposium on Network Computing and Applications (NCA'11). :140-146

Cambridge, MA, United St... Bi-source Leader based solution Authentication Byzantine process Distributed system
Conference
Save to List
147

Predictable Multithreading of Embedded Applications Using PRET-C
Andalam, Sidharta ; Roop, Partha ; Girault, Alain ; et al.
International Conference on Formal Methods and Models for Codesign. :159-168

Grenoble, France ACM: C.: Computer System... C.3: SPECIAL-PURPOSE AND... C.3.2: Real-time and emb... ACM: D.: Software D.3: PROGRAMMING LANGUAG...
Conference
Save to List
148

Flow-Level Modeling of Parallel Download in Distributed Systems
Dandoush, Abdulhalim ; Jean-Marie, Alain ; Models for the performance analysis and the control of networks (MAESTRO) ; et al.
CTRQ: Communication Theory. :92-97

Athens, Greece ACM: C.: Computer System... C.2: COMPUTER-COMMUNICAT... C.2.1: Network Architect... C.2.1.3: Distributed net... [INFO.INFO-NI]Computer S...
Conference
Save to List
149

Synapse: A Scalable Protocol for Interconnecting Heterogeneous Overlay Networks
Liquori, Luigi ; Tedeschi, Cédric ; Vanni, Laurent ; et al.
Networking 2010 - 9th International IFIP TC 6 Networking Conference. :67-82

Chennai, India ACM: C.: Computer System... C.2: COMPUTER-COMMUNICAT... C.2.2: Network Protocols C.2.6: Internetworking [INFO.INFO-NI]Computer S...
Conference
Save to List
150

VeTo: An Exploit Prevention Language from Known Vulnerabilities in SIP Services
Lahmadi, Abdelkader ; Festor, Olivier ; Management of dynamic networks and services (MADYNES) ; et al.
IEEE/IFIP Network Operations and Management Symposium - NOMS 2010. :216-223

Osaka, Japan Prevention Language Vulnerability SIP SecSIP
Conference
Save to List
151

Dynamic sharing of a multiple access channel
Bienkowski, Marcin ; Klonowski, Marek ; Korzeniowski, Miroslaw ; et al.
27th International Symposium on Theoretical Aspects of Computer Science - STACS 2010. :83-94

Nancy, France distributed algorithms multiple access channel mutual exclusion ACM: C.: Computer System... C.1: PROCESSOR ARCHITECT...
Conference
Save to List
152

CarPal: interconnecting overlay networks for a community-driven shared mobility
Ciancaglini, Vincenzo ; Liquori, Luigi ; Vanni, Laurent ; et al.
Trustworthly Global Computing 5th International Symposium. :301-317

München, Germany ACM: C.: Computer System... C.2: COMPUTER-COMMUNICAT... C.2.2: Network Protocols C.2.6: Internetworking [INFO.INFO-NI]Computer S...
Conference
Save to List
153

POSTER: Wavelength Allocation for Efficient Communications on Optical Network-on-Chip
Luo, Jiating ; Pham, Van-Dung ; Killian, Cedric ; et al.
Conference on Design and Architectures for Signal and Image Processing. :1656-1658

Rennes, France ACM: C.: Computer System... C.2: COMPUTER-COMMUNICAT... C.2.2: Network Protocols ACM: D.: Software D.4: OPERATING SYSTEMS
Conference
Save to List
154

Context-Adaptive Vehicular Network Optimization
Mehani, Olivier ; Boreli, Roksana ; Ernst, Thierry ; et al.
ITST 2009. :186-191

Lille, France IPv6 mobility multihoming context-aware performance optimization
Conference
Save to List
155

P2P Storage Systems: How Much Locality Can They Tolerate?
Giroire, Frédéric ; Monteiro, Julian ; Pérennes, Stéphane ; et al.
IEEE Conference on Local Computer Networks (LCN). :320-323

Zurich, Switzerland ACM: C.: Computer System... C.4: PERFORMANCE OF SYST... C.2: COMPUTER-COMMUNICAT... C.2.4: Distributed Syste... [INFO.INFO-NI]Computer S...
Conference
Save to List
156

Minimum delay Data Gathering in Radio Networks
Bermond, Jean-Claude ; Nisse, Nicolas ; Reyes, Patricio ; et al.
ADHOC-NOW 2009 - 8th international conference on Ad Hoc Networks and Wireless. :69-82

Murcia, Spain ACM: C.: Computer System... C.2: COMPUTER-COMMUNICAT... C.2.2: Network Protocols C.2.2.3: Routing protoco... ACM: G.: Mathematics of...
Conference
Save to List
157

Dynamic Localized Broadcast Incremental Power Protocol and Lifetime in Wireless Ad Hoc and Sensor Networks
Champ, Julien ; Boudet, Vincent ; Baert, Anne-Elisabeth ; et al.
WMNC 2009 - 2nd Joint Conference on Wireless and Mobile Networking Conference. :286-296

Gdansk, Poland WG 6.8 ACM: D.: Software D.4: OPERATING SYSTEMS D.4.4: Communications Ma... D.4.4.3: Network communi...
Conference
Save to List
158

Babelchord: a Social Tower of DHT-Based Overlay Networks
Liquori, Luigi ; Tedeschi, Cédric ; Bongiovanni, Francesco ; et al.
IEEE Symposium on Computers and Communications. :307-312

Sousse, Tunisia ACM: C.: Computer System... C.2: COMPUTER-COMMUNICAT... C.2.2: Network Protocols C.2.6: Internetworking [INFO.INFO-NI]Computer S...
Conference
Save to List
159

Backup Path Classification Based on Failure Risks for Efficient Backup Path Computation
Saidi, Mohand Yazid ; Cousin, Bernard ; Le Roux, Jean-Louis ; et al.
8th International Conference on Networking (Networking 2009). In Lecture Notes in Computer Science n° 5550. :509-520

Aachen, Germany network survivability local protection Shared Risk Link Group (... resource optimization MPLS
Conference
Save to List
160

Model-Based Design of Embeded Control Systems by means of a Synchronous Intermediate Model
Alras, M. ; Caspi, Paul ; Girault, Alain ; et al.
International Conference on Embedded Systems and Software. :3-10

Hangzhou, China Model-based design Embedded systems Code generation Synchronous languages Real-time systems.
Conference
Save to List

Filter