Sciweavers

1291 search results - page 137 / 259
» Intrusion Detection for Distributed Applications
Sort
View
IPPS
2006
IEEE
14 years 2 months ago
D1HT: a distributed one hop hash table
Distributed Hash Tables (DHTs) have been used in a variety of applications, but most DHTs so far have opted to solve lookups with multiple hops, which sacrifices performance in o...
Luiz Rodolpho Monnerat, Cláudio L. Amorim
MIDDLEWARE
2005
Springer
14 years 2 months ago
Scrivener: Providing Incentives in Cooperative Content Distribution Systems
Cooperative peer-to-peer (p2p) applications are designed to share the resources of participating computers for the common good of all users. However, users do not necessarily have ...
Animesh Nandi, Tsuen-Wan Ngan, Atul Singh, Peter D...
DCOSS
2007
Springer
14 years 25 days ago
Energy-Efficient Data Acquisition Using a Distributed and Self-organizing Scheduling Algorithm for Wireless Sensor Networks
Abstract. Wireless sensor networks are often densely deployed for environmental monitoring applications. Collecting raw data from these networks can lead to excessive energy consum...
Supriyo Chatterjea, Tim Nieberg, Yang Zhang, Paul ...
ATAL
2006
Springer
14 years 19 days ago
Adaptive distributed resource allocation and diagnostics using cooperative information-sharing strategies
A major challenge in efficiently solving distributed resource allocation problems is to cope with the dynamic state changes that characterise such systems. An effective solution t...
Partha Sarathi Dutta, Nicholas R. Jennings, Luc Mo...
ASE
1999
126views more  ASE 1999»
13 years 8 months ago
Behaviour Analysis of Distributed Systems Using the Tracta Approach
Behaviour analysis should form an integral part of the software development process. This is particularly important in the design of concurrent and distributed systems, where comp...
Dimitra Giannakopoulou, Jeff Kramer, Shing-Chi Che...