Sciweavers

1030 search results - page 167 / 206
» Performance Evaluation of Network Systems Accounting for Use...
Sort
View
P2P
2010
IEEE
127views Communications» more  P2P 2010»
13 years 6 months ago
Waiting for Anonymity: Understanding Delays in the Tor Overlay
Although Tor is the most widely used overlay for providing anonymity services, its users often experience very high delays. Because much of Tor usage is for Web applications, which...
Prithula Dhungel, Moritz Steiner, Ivinko Rimac, Vo...
ICESS
2005
Springer
14 years 2 months ago
AMT6: End-to-End Active Measurement Tool for IPv6 Network
Since IPv6 has more benefits over IPv4, the development and deployment of the IPv6 protocol-based products are currently taking place and the migration of IPv4 to IPv6 has also be...
Jahwan Koo, Seong-Jin Ahn
DMSN
2005
ACM
13 years 10 months ago
The threshold join algorithm for top-k queries in distributed sensor networks
In this paper we present the Threshold Join Algorithm (TJA), which is an efficient TOP-k query processing algorithm for distributed sensor networks. The objective of a top-k query...
Demetrios Zeinalipour-Yazti, Zografoula Vagena, Di...
AINA
2008
IEEE
14 years 3 months ago
A Comparison of Virtualization Technologies for HPC
Virtualization is a common strategy for improving the utilization of existing computing resources, particularly within data centers. However, its use for high performance computin...
John Paul Walters, Vipin Chaudhary, Minsuk Cha, Sa...
EGC
2005
Springer
14 years 2 months ago
A Monitoring Architecture for Control Grids
Abstract. Monitoring systems are nowadays ubiquitous in complex environments, such as Grids. Their use is fundamental for performance evaluation, problem spotting, advanced debuggi...
Alexandru Iosup, Nicolae Tapus, Stéphane Vi...