Sciweavers

4624 search results - page 182 / 925
» Performance Evaluation of HPCN Applications
Sort
View
IMC
2009
ACM
14 years 5 months ago
Geolocalization of proxied services and its application to fast-flux hidden servers
Fast-flux is a redirection technique used by cyber-criminals to hide the actual location of malicious servers. Its purpose is to evade identification and prevent or, at least de...
Claude Castelluccia, Mohamed Ali Kâafar, Per...
EUROPAR
2004
Springer
14 years 4 months ago
Scheduling of MPI Applications: Self-co-scheduling
Scheduling parallel jobs has been an active investigation area. The scheduler has to deal with heterogeneous workloads and try to obtain throughputs and response times such that en...
Gladys Utrera, Julita Corbalán, Jesú...
ISADS
2003
IEEE
14 years 3 months ago
Mobile Agent Fault Tolerance for Information Retrieval Applications: An Exception Handling Approach
Maintaining mobile agent availability in the presence of agent server crashes is a challenging issue since developers normally have no control over remote agent servers. A popular...
Simon Pears, Jie Xu, Cornelia Boldyreff
TMC
2010
137views more  TMC 2010»
13 years 9 months ago
A Metric for DISH Networks: Analysis, Implications, and Applications
—In wireless networks, node cooperation has been exploited as a data relaying mechanism for decades. However, the wireless channel allows for much richer interaction among nodes....
Tie Luo, Vikram Srinivasan, Mehul Motani
EVOW
2010
Springer
13 years 8 months ago
New Genetic Operators in the Fly Algorithm: Application to Medical PET Image Reconstruction
Abstract. This paper presents an evolutionary approach for image reconstruction in positron emission tomography (PET). Our reconstruction method is based on a cooperative coevoluti...
Franck Patrick Vidal, Jean Louchet, Jean-Marie Roc...