Sciweavers

137 search results - page 13 / 28
» An Evaluation of the Amoeba Group Communication System
Sort
View
ICC
2007
IEEE
164views Communications» more  ICC 2007»
14 years 1 months ago
A Framework of Attacker Centric Cyber Attack Behavior Analysis
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Xuena Peng, Hong Zhao
IPPS
2008
IEEE
14 years 1 months ago
A plug-and-play model for evaluating wavefront computations on parallel architectures
This paper develops a plug-and-play reusable LogGP model that can be used to predict the runtime and scaling behavior of different MPI-based pipelined wavefront applications runni...
Gihan R. Mudalige, Mary K. Vernon, Stephen A. Jarv...
TKDE
2011
177views more  TKDE 2011»
13 years 2 months ago
Load Shedding in Mobile Systems with MobiQual
— In location-based, mobile continual query (CQ) systems, two key measures of quality of service (QoS) are: freshness and accuracy. To achieve freshness, the CQ server must perfo...
Bugra Gedik, Kun-Lung Wu, Ling Liu, Philip S. Yu
INFOCOM
2010
IEEE
13 years 6 months ago
Tree-structured Data Regeneration in Distributed Storage Systems with Regenerating Codes
Abstract—Distributed storage systems provide large-scale reliable data storage by storing a certain degree of redundancy in a decentralized fashion on a group of storage nodes. T...
Jun Li, Shuang Yang, Xin Wang, Baochun Li
BIOWIRE
2007
Springer
14 years 1 months ago
Epcast: Controlled Dissemination in Human-Based Wireless Networks Using Epidemic Spreading Models
Epidemics-inspired techniques have received huge attention in recent years from the distributed systems and networking communities. These algorithms and protocols rely on probabili...
Salvatore Scellato, Cecilia Mascolo, Mirco Musoles...