Sciweavers

1266 search results - page 72 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
LAWEB
2003
IEEE
15 years 9 months ago
Quantitative Analysis of Strategies for Streaming Media Distribution
Streaming media applications are becoming more popular on the late years, as for example, news transmitted live through the web, music, show, and films. Traditional client/server...
Marisa A. Vasconcelos, Leonardo C. da Rocha, Julia...
GLOBECOM
2008
IEEE
15 years 5 months ago
Evaluating P2PSIP under Attack: An Emulative Study
— Recently, establishing a VoIP call using a P2P network instead of regular SIP-servers has been proposed; this novel approach to SIP-signaling is commonly referred to as P2PSIP ...
Jan Seedorf, Frank Ruwolt, Martin Stiemerling, Sav...
SAC
2006
ACM
15 years 10 months ago
Evaluating unstructured peer-to-peer lookup overlays
Unstructured peer-to-peer lookup systems incur small constant overhead per single join or leave operation, and can easily support keyword searches. Hence, they are suitable for dy...
Idit Keidar, Roie Melamed
134
Voted
PVM
2005
Springer
15 years 9 months ago
An Evaluation of Implementation Options for MPI One-Sided Communication
MPI defines one-sided communication operations—put, get, and accumulate—together with three different synchronization mechanisms that define the semantics associated with th...
William D. Gropp, Rajeev Thakur
CODES
1999
IEEE
15 years 8 months ago
Optimizing geographically distributed timed cosimulation by hierarchically grouped messages
raction levels of communication models to allow designers to trade off between performance and accuracy. Contrary to [2][3], we present an optimization method which preserves the a...
Sungjoo Yoo, Kiyoung Choi