Sciweavers

1140 search results - page 87 / 228
» Simulation data exchange (SDX) implementation and use
Sort
View
INFOCOM
2009
IEEE
14 years 3 months ago
Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
—The performance of randomized network coding can suffer significantly when malicious nodes corrupt the content of the exchanged blocks. Previous work have introduced error corr...
Elias Kehdi, Baochun Li
INFOCOM
2010
IEEE
13 years 7 months ago
Safeguarding Data Delivery by Decoupling Path Propagation and Adoption
—False routing announcements are a serious security problem, which can lead to widespread service disruptions in the Internet. A number of detection systems have been proposed an...
Mingui Zhang, Bin Liu, Beichuan Zhang
ICDE
1999
IEEE
105views Database» more  ICDE 1999»
14 years 10 months ago
Scheduling and Data Replication to Improve Tape Jukebox Performance
An increasing number of database applications require online access to massive amounts of data. Since large-scale storage systems implemented entirely on magnetic disk can be impr...
Bruce Hillyer, Rajeev Rastogi, Abraham Silberschat...
SAC
2009
ACM
14 years 3 months ago
Geographical data collection in sensor networks with self-organizing transaction cluster-heads
This paper proposes 2G, a flexible and energy-efficient data collection protocol for sensor networks for increasing network lifetime. To this end, it integrates self-organizing d...
Neeraj Rajgure, Eric Platon, Cristian Borcea, Shin...
SACI
2009
IEEE
14 years 3 months ago
Experiments on a grid layer prototype for shared data programming model
—In the grid context, there is little support for programming paradigms such as shared data or associative programming. We have previously proposed an original idea to attack sha...
Dacian Tudor, Georgiana Macariu, Wolfgang Schreine...