Sciweavers

3319 search results - page 621 / 664
» The topology of dark networks
Sort
View
IPCCC
2006
IEEE
14 years 5 months ago
BGP with an adaptive minimal route advertisement interval
The duration of the Minimal Route Advertisement Interval (MRAI) and the implementation of MRAI timers have a significant influence on the convergence time of the Border Gateway Pr...
Nenad Laskovic, Ljiljana Trajkovic
IPPS
2006
IEEE
14 years 5 months ago
Evaluating cooperative checkpointing for supercomputing systems
Cooperative checkpointing, in which the system dynamically skips checkpoints requested by applications at runtime, can exploit system-level information to improve performance and ...
Adam J. Oliner, Ramendra K. Sahoo
IPPS
2006
IEEE
14 years 5 months ago
Parallel implementation of the replica exchange molecular dynamics algorithm on Blue Gene/L
The Replica Exchange method is a popular approach for studying the folding thermodynamics of small to modest size proteins in explicit solvent, since it is easily parallelized. Ho...
Maria Eleftheriou, Aleksandr Rayshubskiy, Jed W. P...
ISCC
2006
IEEE
113views Communications» more  ISCC 2006»
14 years 5 months ago
Hierarchical Home Agent Architecture for Mobile IP Communications
While the Mobile IP protocol does not exclude the use of multiple Home Agents (HAs), it does not impose any particular model either. Recent solutions propose that a mobile node us...
Imed Romdhani, Jose Munoz, Hatem Bettahar, Abdelma...
VALUETOOLS
2006
ACM
141views Hardware» more  VALUETOOLS 2006»
14 years 5 months ago
A realistic simulation of internet-scale events
Internet-scale security incidents are becoming increasingly common, and the researchers need tools to replicate and study them in a controlled setting. Current network simulators,...
Songjie Wei, Jelena Mirkovic