Sciweavers

79 search results - page 14 / 16
» Design and Scalability of NLS, a Scalable Naming and Locatio...
Sort
View
TSMC
2010
13 years 2 months ago
Distributed Explicit Rate Schemes in Multi-Input-Multi-Output Network Systems
Abstract--With the ever-increasing wireless/wired data applications recently, considerable efforts have focused on the design of distributed explicit rate flow control schemes for ...
Naixue Xiong, Athanasios V. Vasilakos, Laurence Ti...
ECAI
2010
Springer
13 years 8 months ago
Parallel TBox Classification in Description Logics - First Experimental Results
Abstract. One of the most frequently used inference services of description logic reasoners classifies all named classes of OWL ontologies into a subsumption hierarchy. Due to emer...
Mina Aslani, Volker Haarslev
JNW
2006
142views more  JNW 2006»
13 years 7 months ago
Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is...
Yih Huang, David Arsenault, Arun Sood
GEOINFORMATICA
2007
223views more  GEOINFORMATICA 2007»
13 years 7 months ago
Algorithms for Nearest Neighbor Search on Moving Object Trajectories
Nearest Neighbor (NN) search has been in the core of spatial and spatiotemporal database research during the last decade. The literature on NN query processing algorithms so far d...
Elias Frentzos, Kostas Gratsias, Nikos Pelekis, Ya...
IPTPS
2003
Springer
14 years 28 days ago
PeerNet: Pushing Peer-to-Peer Down the Stack
- An unwritten principle of the Internet Protocol is that the IP address of a node also serves as its identifier. We observe that many scalability problems result from this princi...
Jakob Eriksson, Michalis Faloutsos, Srikanth V. Kr...