Sciweavers

1291 search results - page 137 / 259
» Intrusion Detection for Distributed Applications
Sort
View
IPPS
2006
IEEE
15 years 8 months ago
D1HT: a distributed one hop hash table
Distributed Hash Tables (DHTs) have been used in a variety of applications, but most DHTs so far have opted to solve lookups with multiple hops, which sacrifices performance in o...
Luiz Rodolpho Monnerat, Cláudio L. Amorim
109
Voted
MIDDLEWARE
2005
Springer
15 years 8 months ago
Scrivener: Providing Incentives in Cooperative Content Distribution Systems
Cooperative peer-to-peer (p2p) applications are designed to share the resources of participating computers for the common good of all users. However, users do not necessarily have ...
Animesh Nandi, Tsuen-Wan Ngan, Atul Singh, Peter D...
143
Voted
DCOSS
2007
Springer
15 years 6 months ago
Energy-Efficient Data Acquisition Using a Distributed and Self-organizing Scheduling Algorithm for Wireless Sensor Networks
Abstract. Wireless sensor networks are often densely deployed for environmental monitoring applications. Collecting raw data from these networks can lead to excessive energy consum...
Supriyo Chatterjea, Tim Nieberg, Yang Zhang, Paul ...
ATAL
2006
Springer
15 years 6 months ago
Adaptive distributed resource allocation and diagnostics using cooperative information-sharing strategies
A major challenge in efficiently solving distributed resource allocation problems is to cope with the dynamic state changes that characterise such systems. An effective solution t...
Partha Sarathi Dutta, Nicholas R. Jennings, Luc Mo...
132
Voted
ASE
1999
126views more  ASE 1999»
15 years 2 months ago
Behaviour Analysis of Distributed Systems Using the Tracta Approach
Behaviour analysis should form an integral part of the software development process. This is particularly important in the design of concurrent and distributed systems, where comp...
Dimitra Giannakopoulou, Jeff Kramer, Shing-Chi Che...