Sciweavers

4330 search results - page 804 / 866
» Analyzing security architectures
Sort
View
150
Voted
CORR
2002
Springer
156views Education» more  CORR 2002»
15 years 3 months ago
Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design
Despite recent excitement generated by the peer-to-peer (P2P) paradigm and the surprisingly rapid deployment of some P2P applications, there are few quantitative evaluations of P2...
Matei Ripeanu, Ian T. Foster, Adriana Iamnitchi
149
Voted
INTERNET
2002
142views more  INTERNET 2002»
15 years 3 months ago
Mapping the Gnutella Network
Despite recent excitement generated by the peer-to-peer (P2P) paradigm and the surprisingly rapid deployment of some P2P applications, there are few quantitative evaluations of P2...
Matei Ripeanu, Adriana Iamnitchi, Ian T. Foster
147
Voted
ISCA
2011
IEEE
270views Hardware» more  ISCA 2011»
14 years 7 months ago
Sampling + DMR: practical and low-overhead permanent fault detection
With technology scaling, manufacture-time and in-field permanent faults are becoming a fundamental problem. Multi-core architectures with spares can tolerate them by detecting an...
Shuou Nomura, Matthew D. Sinclair, Chen-Han Ho, Ve...
233
Voted
IPSN
2011
Springer
14 years 6 months ago
Is there light at the ends of the tunnel? Wireless sensor networks for adaptive lighting in road tunnels
Existing deployments of wireless sensor networks (WSNs) are often conceived as stand-alone monitoring tools. In this paper, we report instead on a deployment where the WSN is a ke...
Matteo Ceriotti, Michele Corrà, Leandro D'O...
PROCEDIA
2011
14 years 6 months ago
GPU-accelerated Chemical Similarity Assessment for Large Scale Databases
The assessment of chemical similarity between molecules is a basic operation in chemoinformatics, a computational area concerning with the manipulation of chemical structural info...
Marco Maggioni, Marco D. Santambrogio, Jie Liang