Sciweavers

820 search results - page 141 / 164
» Techniques for Efficient Interactive Configuration of Distri...
Sort
View
CCS
2007
ACM
14 years 2 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
DEBS
2008
ACM
13 years 10 months ago
Speculative out-of-order event processing with software transaction memory
In event stream applications, events flow through a network of components that perform various types of operations, e.g., filtering, aggregation, transformation. When the operatio...
Andrey Brito, Christof Fetzer, Heiko Sturzrehm, Pa...
COOP
2004
13 years 10 months ago
Model Checking Groupware Protocols
Abstract. The enormous improvements in the efficiency of model-checking techniques in recent years facilitates their application to ever more complex systems of concurrent and dist...
Maurice H. ter Beek, Mieke Massink, Diego Latella,...
ICDE
2006
IEEE
108views Database» more  ICDE 2006»
14 years 10 months ago
Skyline Queries Against Mobile Lightweight Devices in MANETs
Skyline queries are well suited when retrieving data according to multiple criteria. While most previous work has assumed a centralized setting this paper considers skyline queryi...
Zhiyong Huang, Christian S. Jensen, Hua Lu, Beng C...
ICDIM
2007
IEEE
14 years 3 months ago
Fast encounter-based synchronization for mobile devices
The large and growing number of computing devices used by individuals has caused the challenges of distributed storage to take on increased importance. In addition to desktops and...
Daniel Peek, Douglas B. Terry, Venugopalan Ramasub...