Sciweavers

1371 search results - page 157 / 275
» A Model for Large Scale Self-Stabilization
Sort
View
CIKM
2001
Springer
14 years 1 months ago
Managing Trust in a Peer-2-Peer Information System
Managing trust is a problem of particular importance in peer-to-peer environments where one frequently encounters unknown agents. Existing methods for trust management, that are b...
Karl Aberer, Zoran Despotovic
NGC
2001
Springer
196views Communications» more  NGC 2001»
14 years 1 months ago
Application-Level Multicast Using Content-Addressable Networks
Abstract. Most currently proposed solutions to application-level multicast organize the group members into an application-level mesh over which a DistanceVector routing protocol, o...
Sylvia Ratnasamy, Mark Handley, Richard M. Karp, S...
AAAI
2006
13 years 10 months ago
Compilation of Query-Rewriting Problems into Tractable Fragments of Propositional Logic
We consider the problem of rewriting a query efficiently using materialized views. In the context of information integration, this problem has received significant attention in th...
Yolifé Arvelo, Blai Bonet, Maria-Esther Vid...
WSC
1997
13 years 10 months ago
Long-Lasting Transient Conditions in Simulations with Heavy-Tailed Workloads
Recent evidence suggests that some characteristics of computer and telecommunications systems may be well described using heavy tailed distributions — distributions whose tail d...
Mark Crovella, Lester Lipsky
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
13 years 8 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...