Sciweavers

5511 search results - page 903 / 1103
» Security for Network Places
Sort
View
SYSTOR
2010
ACM
15 years 4 months ago
Empirical quantification of opportunities for content adaptation in web servers
A basic problem in the management of web servers is capacity planning: you want enough capacity to be able to serve peak loads, but not too much so as to avoid excessive costs. It...
Michael Gopshtein, Dror G. Feitelson
153
Voted
CORR
2010
Springer
195views Education» more  CORR 2010»
15 years 4 months ago
Dynamic management of transactions in distributed real-time processing system
Managing the transactions in real time distributed computing system is not easy, as it has heterogeneously networked computers to solve a single problem. If a transaction runs acr...
Y. Jayanta Singh, Yumnam Somananda Singh, Ashok Ga...
CN
2006
97views more  CN 2006»
15 years 4 months ago
Fault tolerance for home agents in mobile IP
In the conventional IP protocol, whenever a mobile device moves to a different network, it must change its IP address to communicate with other nodes in the Internet. Mobile IP pr...
Yin-Fu Huang, Min-Hsiu Chuang
IJSNET
2008
115views more  IJSNET 2008»
15 years 4 months ago
Event-driven sensor deployment using self-organizing maps
: Coverage is an important optimization objective in pre and post-deployment stage of a Wireless Sensor Network (WSN). In this paper, we address the issue of placing a finite set o...
Cris Koutsougeras, Yi Liu, Rong Zheng
152
Voted
IM
2008
15 years 4 months ago
Fast and Efficient Restricted Delaunay Triangulation in Random Geometric Graphs
Let G = G(n, r) be a random geometric graph resulting from placing n nodes uniformly at random in the unit square (disk) and connecting every two nodes if and only if their Euclide...
Chen Avin