Sciweavers

589 search results - page 33 / 118
» Efficient and dependable overlay networks
Sort
View
ICDE
2006
IEEE
144views Database» more  ICDE 2006»
14 years 9 months ago
Network-Aware Operator Placement for Stream-Processing Systems
To use their pool of resources efficiently, distributed stream-processing systems push query operators to nodes within the network. Currently, these operators, ranging from simple...
Peter R. Pietzuch, Jonathan Ledlie, Jeffrey Shneid...
PODS
2006
ACM
96views Database» more  PODS 2006»
14 years 7 months ago
Efficient gossip-based aggregate computation
Recently, there has been a growing interest in gossip-based protocols that employ randomized communication to ensure robust information dissemination. In this paper, we present a ...
Srinivas R. Kashyap, Supratim Deb, K. V. M. Naidu,...
INFOCOM
2005
IEEE
14 years 1 months ago
Capturing accurate snapshots of the Gnutella network
— A common approach for measurement-based characterization of peer-to-peer (P2P) systems is to capture overlay snapshots using a crawler. The accuracy of captured snapshots by P2...
Daniel Stutzbach, Reza Rejaie
GLOBECOM
2009
IEEE
13 years 5 months ago
Performance Modeling for Heterogeneous Wireless Networks with Multiservice Overflow Traffic
Performance modeling is important for the purpose of developing efficient dimensioning tools for large complicated networks. But it is difficult to achieve in heterogeneous wireles...
Qian Huang, King-Tim Ko, Villy Bæk Iversen
CORR
2008
Springer
107views Education» more  CORR 2008»
13 years 7 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg