Sciweavers

1647 search results - page 167 / 330
» Distributing private data in challenged network environments
Sort
View
TWC
2008
124views more  TWC 2008»
15 years 4 months ago
On the Performance of Distributed Polling Service-based Medium Access Control
It has been shown in the literature that many MAC protocols for wireless networks have a considerable control overhead, which limits their achievable throughput and delay performan...
Yihan Li, Shiwen Mao, Shivendra S. Panwar, Scott F...
PPOPP
1999
ACM
15 years 8 months ago
Dynamic Instrumentation of Threaded Applications
The use of threads is becoming commonplace in both sequential and parallel programs. This paper describes our design and initial experience with non-trace based performance instru...
Zhichen Xu, Barton P. Miller, Oscar Naim
CORR
2008
Springer
98views Education» more  CORR 2008»
15 years 4 months ago
An Information-Theoretical View of Network-Aware Malware Attacks
This work investigates three aspects: (a) a network vulnerability as the non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent malwares that exploit such a vulne...
Zesheng Chen, Chuanyi Ji
CORR
2010
Springer
116views Education» more  CORR 2010»
15 years 4 months ago
LiquidXML: Adaptive XML Content Redistribution
We propose to demonstrate LiquidXML, a platform for managing large corpora of XML documents in large-scale P2P networks. All LiquidXML peers may publish XML documents to be shared...
Jesús Camacho-Rodríguez, Asterios Ka...
JFR
2006
109views more  JFR 2006»
15 years 4 months ago
Alice: An information-rich autonomous vehicle for high-speed desert navigation
This paper describes the implementation and testing of Alice, the California Institute of Technology's entry in the 2005 DARPA Grand Challenge. Alice utilizes a highly networ...
Lars B. Cremean, Tully B. Foote, Jeremy H. Gillula...