Sciweavers

10 search results - page 2 / 2
» issads 2005
Sort
View
ISSADS
2005
Springer
13 years 10 months ago
Implementing Distributed Mutual Exclusion on Multithreaded Environments: The Alien-Threads Approach
We present a simple implementation of a token-based distributed mutual exclusion algorithm for multithreaded systems. Several per-node requests could be issued by threads running ...
Federico Meza, Jorge Pérez R., Yadran Etero...
ISSADS
2005
Springer
13 years 10 months ago
Extending Databases to Precision-Controlled Retrieval of Qualitative Information
A hierarchy is an arrangement of qualitative values in a tree with certain properties. Hierarchies allow to define the confusion conf(r, s) in using qualitative value r instead of ...
Victor-Polo de Gyves, Adolfo Guzmán-Arenas,...
ISSADS
2005
Springer
13 years 10 months ago
Architecture for Media Streaming Delivery over P2P Networks
Peer-to-Peer networks (P2P) exhibit specific characteristics that can be exploited for media streaming delivery. In this paper we propose a P2Pbased architecture for video streamin...
Francisco de Asís López-Fuentes, Eck...
ISSADS
2005
Springer
13 years 10 months ago
On the Role of Information Compaction to Intrusion Detection
An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...
Fernando Godínez, Dieter Hutter, Raul Monro...
ISSADS
2005
Springer
13 years 10 months ago
Database System Architecture - A Walk Through Time: From Centralized Platform to Mobile Computing - Keynote Address
Classical distributed database systems monolithically offer distribution transparency and higher performance. This is made possible by making data available and closer to the appl...
Ali R. Hurson, Yu Jiao