Sciweavers

5325 search results - page 942 / 1065
» Effective Computation for Nonlinear Systems
Sort
View
125
Voted
P2P
2008
IEEE
135views Communications» more  P2P 2008»
15 years 10 months ago
Popularity-Aware Prefetch in P2P Range Caching
Unstructured peer-to-peer infrastructure has been widely employed to support large-scale distributed applications. Many of these applications, such as locationbased services and m...
Qiang Wang, Khuzaima Daudjee, M. Tamer Özsu
112
Voted
PIMRC
2008
IEEE
15 years 10 months ago
Increasing SIP firewall performance by ruleset size limitation
Abstract— To protect SIP communication networks from attacks, especially flooding attacks like Denial-of-Service or message spam, Intrusion Detection Systems (IDS) are deployed ...
Sven Ehlert, Ge Zhang, Thomas Magedanz
124
Voted
SMI
2008
IEEE
110views Image Analysis» more  SMI 2008»
15 years 10 months ago
OCTOR: OCcurrence selecTOR in pattern hierarchies
Hierarchies of patterns of features, of sub-assemblies, or of CSG sub-expressions are used in architectural and mechanical CAD to eliminate laborious repetitions from the design p...
Justin Jang, Jarek Rossignac
121
Voted
ICDM
2007
IEEE
157views Data Mining» more  ICDM 2007»
15 years 10 months ago
Failure Prediction in IBM BlueGene/L Event Logs
Frequent failures are becoming a serious concern to the community of high-end computing, especially when the applications and the underlying systems rapidly grow in size and compl...
Yinglung Liang, Yanyong Zhang, Hui Xiong, Ramendra...
112
Voted
ICPADS
2007
IEEE
15 years 10 months ago
ECHoP2P: Emergency call handling over peer-to-peer overlays
The impact of the peer-to-peer paradigm increases both in research and in industry. Still, serious applications for P2P-based systems are rare. On the other hand, Emergency Call H...
Kalman Graffi, Aleksandra Kovacevic, Kyra Wulffert...