Sciweavers

ICPADS
2005
IEEE
14 years 6 months ago
Game Theory As A Tool To Strategize As Well As Predict Nodes Behavior In Peer-to-Peer Networks
In this paper we use game theory to study nodes’ behavior in peer-to-peer networks when nodes receive service based on their reputation. Reputation is used as a mechanism to inc...
Rohit Gupta, Arun K. Somani
ICPADS
2005
IEEE
14 years 6 months ago
Distributed Spanning Tree Algorithms for Large Scale Traversals
— The Distributed Spanning Tree (DST) is an overlay structure designed to be scalable. It supports the growth from small scale to large scale. The DST is a tree without bottlenec...
Sylvain Dahan
ICPADS
2005
IEEE
14 years 6 months ago
PRec-I-DCM3: A Parallel Framework for Fast and Accurate Large Scale Phylogeny Reconstruction
: Accurate reconstruction of phylogenetic trees very often involves solving hard optimization problems, particularly the maximum parsimony (MP) and maximum likelihood (ML) problems...
Cristian Coarfa, Yuri Dotsenko, John M. Mellor-Cru...
ICPADS
2005
IEEE
14 years 6 months ago
An Architecture for Multi-Agent COTS Software Integration Systems
Commercial Off-The-Shelf (COTS) software products are increasingly used as software components in large-scale systems. We had proposed an approach for distributed COTS software int...
Guo-Ming Fang, Jim-Min Lin
ICPADS
2005
IEEE
14 years 6 months ago
Group Communication Protocol for Autonomic Computing
: We discuss a group protocol which supports applications with group communication service when QoS supported by networks or required by applications is changed. An autonomic group...
Tomoya Enokido, Makoto Takizawa
ICPADS
2005
IEEE
14 years 6 months ago
Delay-Energy Aware Routing Protocol for Sensor and Actor Networks
We present a novel Delay-Energy Aware Routing Protocol (DEAP) for for heterogeneous sensor and actor networks. DEAP enable a wide range of tradoffs between delay and energy consum...
Arjan Durresi, Vamsi Paruchuri, Leonard Barolli
ICPADS
2005
IEEE
14 years 6 months ago
A Differentiated Message Delivery Architecture to Control Spam
Unsolicited bulk electronic mail (spam) is increasingly plaguing the Internet Email system and deteriorating its value as a convenient communication tools. In this paper we argue ...
Zhenhai Duan, Yingfei Dong, Kartik Gopalan
ICPADS
2005
IEEE
14 years 6 months ago
A Pure Lazy Technique for Scalable Transaction Processing in Replicated Databases
Recently, there have been proposals for scaling-up a database system using lazy replication. In these proposals, system scale-up is achieved through the addition of secondary site...
Khuzaima Daudjee, Kenneth Salem
ICPADS
2005
IEEE
14 years 6 months ago
Minimizing Energy via Loop Scheduling and DVS for Multi-Core Embedded Systems
Low energy consumptions are extremely important in real-time embedded systems, and scheduling is one of the techniques used to obtain lower energy consumptions. In this paper, we ...
Ying Chen, Zili Shao, Qingfeng Zhuge, Chun Xue, Bi...