Sciweavers

5234 search results - page 1005 / 1047
» Simulation of Computer Network Attacks
Sort
View
112
Voted
SIGECOM
2005
ACM
166views ECommerce» more  SIGECOM 2005»
15 years 8 months ago
A price-anticipating resource allocation mechanism for distributed shared clusters
In this paper we formulate the fixed budget resource allocation game to understand the performance of a distributed marketbased resource allocation system. Multiple users decide ...
Michal Feldman, Kevin Lai, Li Zhang
NOSSDAV
2005
Springer
15 years 8 months ago
Natural selection in peer-to-peer streaming: from the cathedral to the bazaar
Success of peer-to-peer applications in many cases is attributed to user altruism, where a user contributes some of its own resources to facilitate performance of other users. Thi...
Vivek Shrivastava, Suman Banerjee
DCOSS
2005
Springer
15 years 8 months ago
Collaborative Sensing Using Sensors of Uncoordinated Mobility
Abstract— Wireless sensor networks are useful for monitoring physical parameters and detecting objects or substances in an area. Most ongoing research consider the use of either ...
Kuang-Ching Wang, Parmesh Ramanathan
SIGCOMM
2003
ACM
15 years 7 months ago
Making gnutella-like P2P systems scalable
Napster pioneered the idea of peer-to-peer file sharing, and supported it with a centralized file search facility. Subsequent P2P systems like Gnutella adopted decentralized sea...
Yatin Chawathe, Sylvia Ratnasamy, Lee Breslau, Nic...
123
Voted
DEXA
2003
Springer
106views Database» more  DEXA 2003»
15 years 7 months ago
Location Query Based on Moving Behaviors
The importance of location prediction is rapidly increasing with the current trend of database applications in mobile computing environment. However, current personal communicatio...
Ming-Hui Jin, Eric Hsiao-Kuang Wu, Jorng-Tzong Hor...
« Prev « First page 1005 / 1047 Last » Next »