Sciweavers

6608 search results - page 1259 / 1322
» On the Completeness of Model Checking
Sort
View
156
Voted
ICPADS
2010
IEEE
15 years 1 months ago
Enhancing MapReduce via Asynchronous Data Processing
The MapReduce programming model simplifies large-scale data processing on commodity clusters by having users specify a map function that processes input key/value pairs to generate...
Marwa Elteir, Heshan Lin, Wu-chun Feng
173
Voted
ICWS
2010
IEEE
15 years 1 months ago
An Approach for Context-Aware Service Discovery and Recommendation
Given the large amount of existing services and the diversified needs nowadays, it is time-consuming for end-users to find appropriate services. To help end-users obtain their desi...
Hua Xiao, Ying Zou, Joanna Ng, Leho Nigul
150
Voted
P2P
2010
IEEE
136views Communications» more  P2P 2010»
15 years 1 months ago
On the Privacy of Peer-Assisted Distribution of Security Patches
Abstract--When a host discovers that it has a software vulnerability that is susceptible to an attack, the host needs to obtain and install a patch. Because centralized distributio...
Di Wu, Cong Tang, Prithula Dhungel, Nitesh Saxena,...
155
Voted
WAOA
2010
Springer
246views Algorithms» more  WAOA 2010»
15 years 1 months ago
Tradeoff between Energy and Throughput for Online Deadline Scheduling
The past few years have witnessed a number of interesting online algorithms for deadline scheduling in the dynamic speed scaling model (in which a processor can vary its speed to ...
Ho-Leung Chan, Tak Wah Lam, Rongbin Li
138
Voted
WD
2010
15 years 1 months ago
Coexistence of radio networks using Aloha
: In this paper we use an analytical model to study how two radio networks : a primary network and a secondary network can coexist within the same area. We use a very simple protoc...
Bartlomiej Blaszczyszyn, Paul Mühlethaler, Sk...
« Prev « First page 1259 / 1322 Last » Next »