Sciweavers

1189 search results - page 181 / 238
» Minimizing churn in distributed systems
Sort
View
GLOBECOM
2008
IEEE
14 years 5 months ago
Power Allocation in Wireless Relay Networks: A Geometric Programming-Based Approach
—1 In this paper, we consider an amplify-and-forward (AF) wireless relay system where multiple source nodes communicate with their corresponding destination nodes with the help o...
Khoa T. Phan, Tho Le-Ngoc, Sergiy A. Vorobyov, Chi...
SASO
2008
IEEE
14 years 5 months ago
A Framework for Self-Protecting Cryptographic Key Management
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...
SSDBM
2008
IEEE
177views Database» more  SSDBM 2008»
14 years 5 months ago
Prioritized Evaluation of Continuous Moving Queries over Streaming Locations
Abstract. Existing approaches to the management of streaming positional updates generally assume that all active user requests have equal importance, ignoring the possibility of an...
Kostas Patroumpas, Timos K. Sellis
CCGRID
2007
IEEE
14 years 5 months ago
Dynamic Malleability in Iterative MPI Applications
Malleability enables a parallel application’s execution system to split or merge processes modifying granularity. While process migration is widely used to adapt applications to...
Kaoutar El Maghraoui, Travis J. Desell, Boleslaw K...
ICDCSW
2007
IEEE
14 years 5 months ago
A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks
In this paper, we consider the problem of reducing the number of false positives generated by cooperative Intrusion Detection Systems (IDSs) in Mobile Ad hoc Networks (MANETs). We...
Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bha...