Sciweavers

1266 search results - page 207 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
P2P
2005
IEEE
104views Communications» more  P2P 2005»
14 years 2 months ago
Elders Know Best - Handling Churn in Less Structured P2P Systems
We address the problem of highly transient populations in unstructured and loosely-structured peerto-peer systems. We propose a number of illustrative query-related strategies and...
Yi Qiao, Fabián E. Bustamante
SKG
2005
IEEE
14 years 2 months ago
A Heuristic Algorithm for Task Scheduling Based on Mean Load
Efficient task scheduling is critical to achieving high performance on grid computing environment. A heuristic task scheduling algorithm satisfied resources load balancing on grid ...
Lina Ni, Jinquan Zhang, ChunGang Yan, Changjun Jia...
USENIX
2003
13 years 9 months ago
Fast, Scalable Disk Imaging with Frisbee
Both researchers and operators of production systems are frequently faced with the need to manipulate entire disk images. Convenient and fast tools for saving, transferring, and i...
Mike Hibler, Leigh Stoller, Jay Lepreau, Robert Ri...
ICCS
2007
Springer
14 years 10 days ago
Building Verifiable Sensing Applications Through Temporal Logic Specification
Abstract. Sensing is at the core of virtually every DDDAS application. Sensing applications typically involve distributed communication and coordination over large self-organized n...
Asad Awan, Ahmed H. Sameh, Suresh Jagannathan, Ana...
IJSNET
2008
115views more  IJSNET 2008»
13 years 8 months ago
Event-driven sensor deployment using self-organizing maps
: Coverage is an important optimization objective in pre and post-deployment stage of a Wireless Sensor Network (WSN). In this paper, we address the issue of placing a finite set o...
Cris Koutsougeras, Yi Liu, Rong Zheng