Sciweavers

1266 search results - page 136 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
HCW
1999
IEEE
15 years 8 months ago
Communication Modeling of Heterogeneous Networks of Workstations for Performance Characterization of Collective Operations
: Networks of Workstations (NOW) have become an attractive alternative platform for high performance computing. Due to the commodity nature of workstations and interconnects and du...
Mohammad Banikazemi, Jayanthi Sampathkumar, Sandee...
APNOMS
2006
Springer
15 years 8 months ago
Network-Adaptive QoS Routing Using Local Information
In this paper, we propose the localized adaptive QoS routing scheme using POMDP(partially observable Markov Decision Processes) and Exploration Bonus. In order to deal with POMDP p...
Jeongsoo Han
CNSR
2005
IEEE
100views Communications» more  CNSR 2005»
15 years 6 months ago
Malicious Behaviour in Content-Addressable Peer-to-Peer Networks
Distributed Hash Tables (DHTs) promise to manage huge sets of key-value pairs in a Peer-to-Peer manner. The Content-Addressable Network (CAN) is a prominent variant of DHT. A crit...
Thomas Reidemeister, Klemens Böhm, Paul A. S....
HPDC
2002
IEEE
15 years 9 months ago
Multigrain Parallelism for Eigenvalue Computations on Networks of Clusters
Clusters of workstations have become a cost-effective means of performing scientific computations. However, large network latencies, resource sharing, and heterogeneity found in ...
James R. McCombs, Andreas Stathopoulos
AVSS
2008
IEEE
15 years 10 months ago
Multi-camera Control through Constraint Satisfaction for Persistent Surveillance
We introduce a distributed camera coalition formation scheme for perceptive scene coverage and persistent surveillance by smart camera sensor networks. The proposed model supports...
Faisal Z. Qureshi, Demetri Terzopoulos