Sciweavers

1266 search results - page 162 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
HPDC
2007
IEEE
15 years 10 months ago
PeerStripe: a p2p-based large-file storage for desktop grids
In desktop grids the use of off-the-shelf shared components makes the use of dedicated resources economically nonviable and increases the complexity of design of efficient storag...
Chreston Miller, Patrick Butler, Ankur Shah, Ali R...
ANCS
2005
ACM
15 years 9 months ago
Addressing data compatibility on programmable network platforms
Large-scale applications require the efficient exchange of data across their distributed components, including data from heterogeneous sources and to widely varying clients. Inher...
Ada Gavrilovska, Karsten Schwan
COREGRID
2007
Springer
15 years 10 months ago
Synthetic Coordinates for Disjoint Multipath Routing
We address the problem of routing packets on multiple, router-disjoint, paths in the Internet using large-scale overlay networks. Multipath routing can improve Internet QoS, by rou...
Andrei Agapi, Thilo Kielmann, Henri E. Bal
SIGCOMM
2006
ACM
15 years 10 months ago
Virtual ring routing: network routing inspired by DHTs
This paper presents Virtual Ring Routing (VRR), a new network routing protocol that occupies a unique point in the design space. VRR is inspired by overlay routing algorithms in D...
Matthew Caesar, Miguel Castro, Edmund B. Nightinga...
MATA
2000
Springer
137views Communications» more  MATA 2000»
15 years 7 months ago
Topology Discovery in Ad Hoc Wireless Networks Using Mobile Agents
Extensive research on mobile agents has been rife with the growing interests in network computing. In this paper, we have discussed a mobile multi-agent-based framework to address ...
Romit Roy Choudhury, Somprakash Bandyopadhyay, Kri...