Sciweavers

682 search results - page 58 / 137
» Reducing Network Traffic Data Sets
Sort
View
ISCC
2006
IEEE
14 years 2 months ago
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks
— Security and QoS are two main issues for a successful wide deployment of multicast services. For instance, in a multicast streaming application, a receiver would require a data...
Yoann Hinard, Hatem Bettahar, Yacine Challal, Abde...
IWCMC
2006
ACM
14 years 2 months ago
TARP: trust-aware routing protocol
Security is a critical issue in a mobile ad hoc network (MANET). In most of the previous protocols security is an added layer above the routing protocol. We propose a TrustAware R...
Loay Abusalah, Ashfaq A. Khokhar, G. BenBrahim, W....
CCGRID
2005
IEEE
14 years 2 months ago
Data grid performance analysis through study of replication and storage infrastructure parameters
Running Data Grid applications such as High Energy Nuclear Physics (HENP) and weather modelling experiments involves working with huge data sets possibly of hundreds of Terabytes ...
Ernest Sithole, Gerard P. Parr, Sally I. McClean
HPCA
1998
IEEE
14 years 1 months ago
The Effectiveness of SRAM Network Caches in Clustered DSMs
The frequency of accesses to remote data is a key factor affecting the performance of all Distributed Shared Memory (DSM) systems. Remote data caching is one of the most effective...
Adrian Moga, Michel Dubois
EDBT
2008
ACM
171views Database» more  EDBT 2008»
14 years 9 months ago
Replay-based approaches to revision processing in stream query engines
Data stream processing systems have become ubiquitous in academic and commercial sectors, with application areas that include financial services, network traffic analysis, battlef...
Anurag Maskey, Mitch Cherniack