Sciweavers

4138 search results - page 727 / 828
» Design and implementation of a network simulation system
Sort
View
CORR
2007
Springer
143views Education» more  CORR 2007»
15 years 4 months ago
On Myopic Sensing for Multi-Channel Opportunistic Access
We consider a multi-channel opportunistic communication system where the states of these channels evolve as independent and statistically identical Markov chains (the Gilbert-Elli...
Qing Zhao, Bhaskar Krishnamachari, Keqin Liu
JSA
2008
81views more  JSA 2008»
15 years 4 months ago
Improving stability for peer-to-peer multicast overlays by active measurements
The instability of the tree-like multicast overlay caused by nodes' abrupt departures is considered as one of the major problems for peer-to-peer (P2P) multicast systems. In ...
Ye Tian, Di Wu, Guangzhong Sun, Kam-Wing Ng
TKDE
1998
77views more  TKDE 1998»
15 years 3 months ago
Techniques for Update Handling in the Enhanced Client-Server DBMS
—The Client-Server computing paradigm has significantly influenced the way modern Database Management Systems are designed and built. In such systems, clients maintain data pages...
Alex Delis, Nick Roussopoulos
CLOUD
2010
ACM
15 years 9 months ago
RACS: a case for cloud storage diversity
The increasing popularity of cloud storage is leading organizations to consider moving data out of their own data centers and into the cloud. However, success for cloud storage pr...
Hussam Abu-Libdeh, Lonnie Princehouse, Hakim Weath...
POPL
2012
ACM
13 years 11 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama