Sciweavers

1266 search results - page 90 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
PADS
2005
ACM
15 years 10 months ago
Distributed Worm Simulation with a Realistic Internet Model
Internet worm spread is a phenomenon involving millions of hosts, who interact in complex and diverse environment. Scanning speed of each infected host depends on its resources an...
Songjie Wei, Jelena Mirkovic, D. Martin Swany
IJHPCA
2002
99views more  IJHPCA 2002»
15 years 4 months ago
Semantic Information Fusion for Coordinated Signal Processing in Mobile Sensor Networks
Distributed cognition of dynamic processes is commonly observed in mobile groups of animates like schools of fish, hunting lions, or in human teams for sports or military maneuvers...
David Friedlander, Shashi Phoha
MTA
2006
115views more  MTA 2006»
15 years 4 months ago
Tree-assisted gossiping for overlay video distribution
Given its readily deployable nature and broad applications for digital entertainment, video streaming through overlay networks has received much attention recently. While a tree to...
Jiangchuan Liu, Ming Zhou
NBIS
2007
Springer
15 years 10 months ago
Implementing Range Queries with a Decentralized Balanced Tree over Distributed Hash Tables
Range queries, retrieving all keys within a given range, is an important add-on for Distributed Hash Tables (DHTs), as they rely only on exact key matching lookup. In this paper we...
Nuno Lopes, Carlos Baquero
ICPP
2000
IEEE
15 years 8 months ago
A Problem-Specific Fault-Tolerance Mechanism for Asynchronous, Distributed Systems
The idle computers on a local area, campus area, or even wide area network represent a significant computational resource--one that is, however, also unreliable, heterogeneous, an...
Adriana Iamnitchi, Ian T. Foster