Sciweavers

1661 search results - page 207 / 333
» Distributed Top-K Monitoring
Sort
View
120
Voted
MUE
2008
IEEE
83views Multimedia» more  MUE 2008»
15 years 8 months ago
Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks
Denial of service attacks occur when the attacks are from a single host, whereas distributed denial of service attacks occur when multiple affected systems flood the bandwidth or ...
Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsun...
ICDE
2007
IEEE
92views Database» more  ICDE 2007»
15 years 8 months ago
A Cost Model for Storing and Retrieving Data in Wireless Sensor Networks
Many applications require storing data in Wireless Sensor Networks (WSNs). For example, in environmental monitoring applications, WSN may archive sensor data for retrieval at peri...
Adesola Omotayo, Moustafa A. Hammad, Ken Barker
IPPS
2007
IEEE
15 years 8 months ago
A Key-based Adaptive Transactional Memory Executor
Software transactional memory systems enable a programmer to easily write concurrent data structures such as lists, trees, hashtables, and graphs, where non-conflicting operation...
Tongxin Bai, Xipeng Shen, Chengliang Zhang, Willia...
SAINT
2007
IEEE
15 years 8 months ago
Data Management on Grid Filesystem for Data-Intensive Computing
In parallel computing environments such as HPC clusters and the Grid, data-intensive applications involve large overhead costs due to a concentration of access to the files on co...
Hitoshi Sato, Satoshi Matsuoka
CCS
2007
ACM
15 years 8 months ago
On the accuracy of decentralized virtual coordinate systems in adversarial networks
Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine the latency to arbitrary hosts without actively monitoring all ...
David John Zage, Cristina Nita-Rotaru