Sciweavers

738 search results - page 116 / 148
» Comparison of Approaches to Service Deployment
Sort
View
ICIP
2006
IEEE
14 years 10 months ago
Congestion-Distortion Optimized Peer-to-Peer Video Streaming
In live peer-to-peer streaming, a video stream is transmitted to a large population of viewers, through the use of the uplink bandwidth of participating peers. This approach overc...
Eric Setton, Jeonghun Noh, Bernd Girod
IEEEIAS
2009
IEEE
14 years 3 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
COMSWARE
2007
IEEE
14 years 3 months ago
Integrated Data Location in Multihop Wireless Networks
Abstract— Multihop wireless networks are ideal as infrastructures for location-aware network applications, particularly for disaster recovery operations. However, one missing com...
Irfan Sheriff, Prashanth Aravinda Kumar Acharya, A...
ICSOC
2007
Springer
14 years 2 months ago
Let It Flow: Building Mashups with Data Processing Pipelines
Mashups are a new kind of interactive Web application, built out of the composition of two or more existing Web service APIs and data sources. Whereas “pure” mashups are built ...
Biörn Biörnstad, Cesare Pautasso
DEXAW
2005
IEEE
151views Database» more  DEXAW 2005»
14 years 2 months ago
An Overlay Network for Resource Discovery in Grids
As Grids try to achieve optimal and balanced utilization of unused resources in a distributed system, fast and efficient discovery of resource states is a key requirement. For sm...
Manfred Hauswirth, Roman Schmidt