Sciweavers

86 search results - page 13 / 18
» Client--Access Protocols for Replicated Services
Sort
View
P2P
2005
IEEE
119views Communications» more  P2P 2005»
14 years 1 months ago
Search with Probabilistic Guarantees in Unstructured Peer-to-Peer Networks
Search is a fundamental service in peer-to-peer (P2P) networks. However, despite numerous research efforts, efficient algorithms for guaranteed location of shared content in unst...
Ronaldo A. Ferreira, Murali Krishna Ramanathan, As...
OTM
2007
Springer
14 years 1 months ago
HARC: The Highly-Available Resource Co-allocator
HARC—the Highly-Available Resource Co-allocator—is an open-source system for reserving multiple resources in a coordinated fashion. HARC can handle different types of resource...
Jon MacLaren
PDIS
1994
IEEE
13 years 11 months ago
Distributed Selective Dissemination of Information
To help users cope with information overload, Selective Dissemination of Information SDI will increasingly become an important tool in wide area information systems. In an SDI ser...
Tak W. Yan, Hector Garcia-Molina
SC
2004
ACM
14 years 29 days ago
RPC-V: Toward Fault-Tolerant RPC for Internet Connected Desktop Grids with Volatile Nodes
RPC is one of the programming models envisioned for the Grid. In Internet connected Large Scale Grids such as Desktop Grids, nodes and networks failures are not rare events. This ...
Samir Djilali, Thomas Hérault, Oleg Lodygen...
NETWORK
2008
94views more  NETWORK 2008»
13 years 7 months ago
Detecting compromised routers via packet forwarding behavior
While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well app...
Alper Tugay Mizrak, Stefan Savage, Keith Marzullo