Sciweavers

2494 search results - page 179 / 499
» Dependable Distributed Computing Using Free Databases
Sort
View
ICPADS
2007
IEEE
14 years 2 months ago
S/Kademlia: A practicable approach towards secure key-based routing
Security is a common problem in completely decentralized peer-to-peer systems. Although several suggestions exist on how to create a secure key-based routing protocol, a practicab...
Ingmar Baumgart, Sebastian Mies
HPCN
1998
Springer
14 years 7 days ago
Scheduling Strategy to improve Response Time for Web Applications
We propose a tunable scheduling strategy that lies between FIFO and shortest- rst, based on the value of a coe cient Alpha. If Alpha is set to zero then this strategy is just FIFO....
Ludmila Cherkasova
CHI
1992
ACM
14 years 3 days ago
Portholes: Supporting Awareness in a Distributed Work Group
We are investigating ways in which media space technologies can support distributed work groups through access to information that supports general awareness. Awareness involves k...
Paul Dourish, Sara A. Bly
SSDBM
2008
IEEE
150views Database» more  SSDBM 2008»
14 years 2 months ago
Summarizing Two-Dimensional Data with Skyline-Based Statistical Descriptors
Much real data consists of more than one dimension, such as financial transactions (eg, price × volume) and IP network flows (eg, duration × numBytes), and capture relationship...
Graham Cormode, Flip Korn, S. Muthukrishnan, Dives...
ADBIS
2007
Springer
126views Database» more  ADBIS 2007»
13 years 12 months ago
Optimal Query Mapping in Mobile OLAP
Query mapping to aggregation lattices is used in order to exploit sub-cube dependencies in multidimensional databases. It is employed in mobile OLAP dissemination systems, in order...
Ilias Michalarias, Hans-Joachim Lenz