Sciweavers

1266 search results - page 85 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
ICDE
2008
IEEE
108views Database» more  ICDE 2008»
16 years 5 months ago
Self-Join Size Estimation in Large-scale Distributed Data Systems
In this work we tackle the open problem of self-join size (SJS) estimation in a large-scale Distributed Data System, where tuples of a relation are distributed over data nodes whic...
Theoni Pitoura, Peter Triantafillou
INFOCOM
2011
IEEE
14 years 8 months ago
A distributed and privacy preserving algorithm for identifying information hubs in social networks
—This paper addresses the problem of identifying the top-k information hubs in a social network. Identifying topk information hubs is crucial for many applications such as advert...
Muhammad Usman Ilyas, Muhammad Zubair Shafiq, Alex...
IPPS
2000
IEEE
15 years 8 months ago
Effective Load Sharing on Heterogeneous Networks of Workstations
We consider networks of workstations which are not only timesharing, but also heterogeneous with a large variation in the computing power and memory capacities of different workst...
Li Xiao, Xiaodong Zhang, Yanxia Qu
CCR
1999
91views more  CCR 1999»
15 years 4 months ago
On the effective evaluation of TCP
Understanding the performance of the Internet's Transmission Control Protocol (TCP) is important because it is the dominant protocol used in the Internet today. Various testi...
Mark Allman, Aaron Falk
WAIM
2005
Springer
15 years 10 months ago
An Ontology-Based Host Resources Monitoring Approach in Grid Environment
Monitoring the real-time status of voluntary nodes is a basic task of Quality of Services (QoS) management in grid. The heterogeneity of distributed host resources is an obvious ob...
Yijiao Yu, Hai Jin