Sciweavers

6004 search results - page 1137 / 1201
» Parallelizing query optimization
Sort
View
ICDCS
2010
IEEE
14 years 20 days ago
Existence Theorems and Approximation Algorithms for Generalized Network Security Games
—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to i...
V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun,...
PODC
2010
ACM
14 years 19 days ago
Hybrid-secure MPC: trading information-theoretic robustness for computational privacy
Most protocols for distributed, fault-tolerant computation, or multi-party computation (MPC), provide security guarantees in an all-or-nothing fashion: If the number of corrupted p...
Christoph Lucas, Dominik Raub, Ueli M. Maurer
ICDCS
2007
IEEE
14 years 19 days ago
Understanding Instant Messaging Traffic Characteristics
Instant messaging (IM) has become increasingly popular due to its quick response time, its ease of use, and possibility of multitasking. It is estimated that there are several mil...
Zhen Xiao, Lei Guo, John M. Tracey
CLADE
2004
IEEE
14 years 15 days ago
An on Demand Path Marking and Capacity Reservation Method using Split Agent
Different schemes for large scale networks hosting distributed applications have been recently adopted for network path marking based on adaptive behavior of swarm-based agents. T...
Constandinos X. Mavromoustakis, Helen D. Karatza
CLUSTER
2001
IEEE
14 years 12 days ago
Semi-Continuous Transmission for Cluster-Based Video Servers
With advances in storage technology, the ability to provide client end storage for continuous media applications has become a possibility. Transmission of data in cluster based mu...
Sandy Irani, Nalini Venkatasubramanian
« Prev « First page 1137 / 1201 Last » Next »