Sciweavers

1266 search results - page 118 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
GIS
2004
ACM
16 years 5 months ago
Supporting spatial aggregation in sensor network databases
Sensor networks are unattended deeply distributed systems whose schema can be conceptualized using the relational model. Aggregation queries on the data sampled at each ode are th...
Mehdi Sharifzadeh, Cyrus Shahabi
EUROPAR
2009
Springer
15 years 2 months ago
A Least-Resistance Path in Reasoning about Unstructured Overlay Networks
Unstructured overlay networks for peer-to-peer applications combined with stochastic algorithms for clustering and resource location are attractive due to low-maintenance costs and...
Giorgos Georgiadis, Marina Papatriantafilou
SC
1994
ACM
15 years 8 months ago
Adaptive load migration systems for PVM
Adaptive load distribution is necessary for parallel applications to co-exist e ectively with other jobs in a network of shared, heterogeneous workstations. We present three metho...
Jeremy Casas, Ravi B. Konuru, Steve W. Otto, Rober...
PAM
2005
Springer
15 years 10 months ago
Analysis of Communities of Interest in Data Networks
Abstract. Communities of interest (COI) have been applied in a variety of environments ranging from characterizing the online buying behavior of individuals to detecting fraud in t...
William Aiello, Charles R. Kalmanek, Patrick Drew ...
WWW
2006
ACM
16 years 5 months ago
The web structure of e-government - developing a methodology for quantitative evaluation
In this paper we describe preliminary work that examines whether statistical properties of the structure of websites can be an informative measure of their quality. We aim to deve...
Vaclav Petricek, Tobias Escher, Ingemar J. Cox, He...