Sciweavers

4273 search results - page 784 / 855
» Improving proactive information systems
Sort
View
PIMRC
2008
IEEE
14 years 3 months ago
An adaptive holdoff algorithm based on node state for IEEE 802.16 mesh mode with coordinated distributed scheduling
Wireless mesh networks (WMNs) are one of the key features of beyond 3G system because of their flexible and lowcost deployment. IEEE 802.16 mesh mode has recently emerged as an alt...
Bong Chan Kim, Dong Gu Kwak, Heecheol Song, Hwang ...
IMC
2006
ACM
14 years 3 months ago
Rarest first and choke algorithms are enough
The performance of peer-to-peer file replication comes from its piece and peer selection strategies. Two such strategies have been introduced by the BitTorrent protocol: the rare...
Arnaud Legout, Guillaume Urvoy-Keller, Pietro Mich...
ICCS
2005
Springer
14 years 2 months ago
Managing Heterogeneity in a Grid Parallel Haskell
Computational Grids potentially offer cheap large-scale high-performance systems, but are a very challenging architecture, being heterogeneous, shared and hierarchical. Rather tha...
Abdallah Al Zain, Philip W. Trinder, Hans-Wolfgang...
VLDB
2004
ACM
114views Database» more  VLDB 2004»
14 years 2 months ago
Hardware Acceleration in Commercial Databases: A Case Study of Spatial Operations
Traditional databases have focused on the issue of reducing I/O cost as it is the bottleneck in many operations. As databases become increasingly accepted in areas such as Geograp...
Nagender Bandi, Chengyu Sun, Amr El Abbadi, Divyak...
CCS
2003
ACM
14 years 2 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson