Sciweavers

1537 search results - page 217 / 308
» Deployment of Distributed Multi-agent Systems
Sort
View
TPDS
2010
107views more  TPDS 2010»
13 years 8 months ago
Optimal Resource Placement in Structured Peer-to-Peer Networks
—Utilizing the skewed popularity distribution in P2P systems, common in Gnutella and KazaA like P2P applications, we propose an optimal resource (replica or link) placement strat...
Weixiong Rao, Lei Chen 0002, Ada Wai-Chee Fu, Guor...
ICSM
2009
IEEE
14 years 4 months ago
Prioritizing component compatibility tests via user preferences
Many software systems rely on third-party components during their build process. Because the components are constantly evolving, quality assurance demands that developers perform ...
Il-Chul Yoon, Alan Sussman, Atif M. Memon, Adam A....
DSN
2008
IEEE
14 years 4 months ago
On localization attacks to Internet Threat Monitors: An information-theoretic framework
Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-ser...
Wei Yu, Nan Zhang 0004, Xinwen Fu, Riccardo Bettat...
COLCOM
2007
IEEE
14 years 4 months ago
SYNG: A middleware for statefull groupware in mobile environments
— Computer supported collaboration systems, or groupware, are being used more and more in the real life. In the recent years, we are witnessing an increasing demand for supportin...
M. Ionescu, I. Marsic
EUROPAR
2005
Springer
14 years 3 months ago
PerfMiner: Cluster-Wide Collection, Storage and Presentation of Application Level Hardware Performance Data
Abstract. We present PerfMiner, a system for the transparent collection, storage and presentation of thread-level hardware performance data across an entire cluster. Every sub-proc...
Philip Mucci, Daniel Ahlin, Johan Danielsson, Per ...