Sciweavers

20638 search results - page 4031 / 4128
» Network Computing
Sort
View
TCSV
2010
14 years 9 months ago
Cooperative Peer-to-Peer Streaming: An Evolutionary Game-Theoretic Approach
While peer-to-peer (P2P) video streaming systems have achieved promising results, they introduce a large number of unnecessary traverse links, which consequently leads to substanti...
Yan Chen, Beibei Wang, W. Sabrina Lin, Yongle Wu, ...
123
Voted
TDP
2010
166views more  TDP 2010»
14 years 9 months ago
Communication-Efficient Privacy-Preserving Clustering
The ability to store vast quantities of data and the emergence of high speed networking have led to intense interest in distributed data mining. However, privacy concerns, as well ...
Geetha Jagannathan, Krishnan Pillaipakkamnatt, Reb...
323
Voted
NAR
2011
374views Computer Vision» more  NAR 2011»
14 years 8 months ago
The BioGRID Interaction Database: 2011 update
The Biological General Repository for Interaction Datasets (BioGRID) is a public database that archives and disseminates genetic and protein interaction data from model organisms ...
Chris Stark, Bobby-Joe Breitkreutz, Andrew Chatr-a...
CCGRID
2011
IEEE
14 years 6 months ago
High Performance Pipelined Process Migration with RDMA
—Coordinated Checkpoint/Restart (C/R) is a widely deployed strategy to achieve fault-tolerance. However, C/R by itself is not capable enough to meet the demands of upcoming exasc...
Xiangyong Ouyang, Raghunath Rajachandrasekar, Xavi...
144
Voted
CODASPY
2011
14 years 5 months ago
Privacy-preserving activity scheduling on mobile devices
—Progress in mobile wireless technology has resulted in the increased use of mobile devices to store and manage users’ personal schedules. Users also access popular contextbase...
Igor Bilogrevic, Murtuza Jadliwala, Jean-Pierre Hu...
« Prev « First page 4031 / 4128 Last » Next »