Sciweavers

1663 search results - page 232 / 333
» Computer Security in the Real World
Sort
View
SPAA
2003
ACM
15 years 9 months ago
The load rebalancing problem
In the classical load balancing or multiprocessor scheduling problem, we are given a sequence of jobs of varying sizes and are asked to assign each job to one of the m empty proce...
Gagan Aggarwal, Rajeev Motwani, An Zhu
144
Voted
IPTPS
2003
Springer
15 years 9 months ago
Scooped, Again
The Peer-to-Peer (p2p) and Grid infrastructure communities are tackling an overlapping set of problems. In addressing these problems, p2p solutions are usually motivated by elegan...
Jonathan Ledlie, Jeffrey Shneidman, Margo I. Seltz...
ISORC
2002
IEEE
15 years 9 months ago
Using Group Communication to Support Mobile Augmented Reality Applications
Augmented reality and group communication in wireless ad-hoc networks form relatively new fields of research. When using group communication ordering and timeliness requirements ...
Niels Reijers, Raymond Cunningham, René Mei...
LCN
2002
IEEE
15 years 9 months ago
A Caching Strategy to Improve iSCSI Performance
iSCSI is one of the most recent standards that allows SCSI protocols to be carried out over IP networks. However, to encapsulate SCSI protocol over IP requires significant amount...
Xubin He, Qing Yang, Ming Zhang
NOSSDAV
2010
Springer
15 years 8 months ago
Second life: a social network of humans and bots
Second Life (SL) is a virtual world where people interact and socialize through virtual avatars. Avatars behave similarly to their human counterparts in real life and naturally de...
Matteo Varvello, Geoffrey M. Voelker