Sciweavers

5114 search results - page 820 / 1023
» Complex networks
Sort
View
118
Voted
FOSAD
2000
Springer
15 years 6 months ago
Security Goals: Packet Trajectories and Strand Spaces
This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in Se...
Joshua D. Guttman
118
Voted
EVOW
2010
Springer
15 years 17 days ago
Evolution of Grim Trigger in Prisoner Dilemma Game with Partial Imitation
The emergence of Grim Trigger as the dominant strategy in the Iterated Prisoner Dilemma (IPD) on a square lattice is investigated for players with finite memory, using three differ...
Degang Wu, Mathis Antony, Kwok Yip Szeto
255
Voted
GIS
2004
ACM
16 years 3 months ago
A serverless 3D world
Online multi-participant virtual-world systems have attracted significant interest from the Internet community but are hindered by their inability to efficiently support interacti...
Egemen Tanin, Aaron Harwood, Hanan Samet, Sarana N...
137
Voted
BROADNETS
2006
IEEE
15 years 8 months ago
Distributed Job Scheduling based on Multiple Constraints Anycast Routing
— As the popularity of resource-constrained devices such as hand-held computers increases, a new network service offloading complex processing tasks towards computational resour...
Tim Stevens, Marc De Leenheer, Filip De Turck, Bar...
156
Voted
PVLDB
2010
116views more  PVLDB 2010»
14 years 9 months ago
Schism: a Workload-Driven Approach to Database Replication and Partitioning
We present Schism, a novel workload-aware approach for database partitioning and replication designed to improve scalability of sharednothing distributed databases. Because distri...
Carlo Curino, Yang Zhang, Evan P. C. Jones, Samuel...