Sciweavers

1266 search results - page 194 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
IPPS
2007
IEEE
15 years 10 months ago
Implementing OLAP Query Fragment Aggregation and Recombination for the OLAP Enabled Grid
In this paper we propose a new query processing method for the OLAP Enabled Grid, which blends sophisticated cache extraction techniques and data grid scheduling to efficiently s...
Michael Lawrence, Frank K. H. A. Dehne, Andrew Rau...
155
Voted
JSW
2008
123views more  JSW 2008»
15 years 3 months ago
Component-oriented Reliability Analysis and Optimal Version-upgrade Problems for Open Source Software
The current software development environment has been changing into new development paradigms such as concurrent distributed development environment and the so-called open source p...
Yoshinobu Tamura, Shigeru Yamada
DPD
1998
141views more  DPD 1998»
15 years 3 months ago
Dynamic Query Operator Scheduling for Wide-Area Remote Access
Distributed databases operating over wide-area networks such as the Internet, must deal with the unpredictable nature of the performance of communication. The response times of acc...
Laurent Amsaleg, Michael J. Franklin, Anthony Toma...
CCS
2009
ACM
16 years 4 months ago
The union-split algorithm and cluster-based anonymization of social networks
Knowledge discovery on social network data can uncover latent social trends and produce valuable findings that benefit the welfare of the general public. A growing amount of resea...
Brian Thompson, Danfeng Yao
ANCS
2007
ACM
15 years 8 months ago
On LID assignment in infiniBand networks
To realize a path in an InfiniBand network, an address, known as Local IDentifier (LID) in the InfiniBand specification, must be assigned to the destination and used in the forwar...
Wickus Nienaber, Xin Yuan, Zhenhai Duan