Sciweavers

550 search results - page 102 / 110
» Dealing with Overload in Distributed Stream Processing Syste...
Sort
View
ISSA
2004
13 years 9 months ago
A Unified Architecture For Automatic Software Updates
This paper attempts to address the issue of hardening the internal security of an organisation's network by easing its patch management. Traditionally security has been model...
Dominic White
SIGMOD
2007
ACM
167views Database» more  SIGMOD 2007»
14 years 7 months ago
Data currency in replicated DHTs
Distributed Hash Tables (DHTs) provide a scalable solution for data sharing in P2P systems. To ensure high data availability, DHTs typically rely on data replication, yet without ...
Reza Akbarinia, Esther Pacitti, Patrick Valduriez
INFOCOM
2009
IEEE
14 years 2 months ago
Protecting Against Network Infections: A Game Theoretic Perspective
— Security breaches and attacks are critical problems in today’s networking. A key-point is that the security of each host depends not only on the protection strategies it choo...
Jasmina Omic, Ariel Orda, Piet Van Mieghem
MATES
2007
Springer
14 years 1 months ago
Coordinating Competitive Agents in Dynamic Airport Resource Scheduling
In real-life multi-agent planning problems, long-term plans will often be invalidated by changes in the environment during or after the planning process. When this happens, short-t...
Xiaoyu Mao, Adriaan ter Mors, Nico Roos, Cees Witt...
WIDM
2004
ACM
14 years 1 months ago
XPath lookup queries in P2P networks
We address the problem of querying XML data over a P2P network. In P2P networks, the allowed kinds of queries are usually exact-match queries over file names. We discuss the exte...
Angela Bonifati, Ugo Matrangolo, Alfredo Cuzzocrea...