Sciweavers

Share
IWNAS
2008
IEEE
9 years 6 months ago
Optimal Implementation of Continuous Data Protection (CDP) in Linux Kernel
To protect data and recover data in case of failures, Linux operating system has built-in MD device that implements RAID architectures. Such device can recover data in case of sin...
Xu Li, Changsheng Xie, Qing Yang
IWNAS
2008
IEEE
9 years 6 months ago
Event-based Trust Framework Model in Wireless Sensor Networks
The security of wireless sensor networks is ever more important nowadays. Most of the proposed security protocols in wireless sensor networks are based on authentication and encry...
Haiguang Chen, Huafeng Wu, Jinchu Hu, Chuanshan Ga...
IWNAS
2008
IEEE
9 years 6 months ago
Software Barrier Performance on Dual Quad-Core Opterons
Multi-core processors based SMP servers have become building blocks for Linux clusters in recent years because they can deliver better performance for multi-threaded programs thro...
Jie Chen, William A. Watson III
IWNAS
2008
IEEE
9 years 6 months ago
Storage Aware Resource Allocation for Grid Data Streaming Pipelines
Data streaming applications, usually composed with sequential/parallel tasks in a data pipeline form, bring new challenges to task scheduling and resource allocation in grid envir...
Wen Zhang, Junwei Cao, Yisheng Zhong, Lianchen Liu...
IWNAS
2008
IEEE
9 years 6 months ago
Accurate Performance Modeling and Guidance to the Adoption of an Inconsistency Detection Framework
With the increased popularity of replica-based services in distributed systems such as the Grid, consistency control among replicas becomes more and more important. To this end, I...
Yijun Lu, Xueming Li, Hong Jiang
IWNAS
2008
IEEE
9 years 6 months ago
Parallel Job Scheduling with Overhead: A Benchmark Study
We study parallel job scheduling, where each job may be scheduled on any number of available processors in a given parallel system. We propose a mathematical model to estimate a j...
Richard A. Dutton, Weizhen Mao, Jie Chen, William ...
IWNAS
2008
IEEE
9 years 6 months ago
A Network Memory Architecture Model and Performance Analysis
Li Liu, Mingyu Chen, Yungang Bao, Jianwei Xu, Jian...
IWNAS
2008
IEEE
9 years 6 months ago
POND: The Power of Zone Overlapping in DHT Networks
— Distributed Hash Table (DHT) based algorithms have been proposed to solve the routing issues in large-scale Peer-to-Peer (P2P) applications. DHT systems create an elegant Peer-...
Zhiyong Xu, Jizhong Han, Laxmi N. Bhuyan
IWNAS
2008
IEEE
9 years 6 months ago
A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks
∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...
Hao Chen, Yu Chen
IWNAS
2008
IEEE
9 years 6 months ago
VDMS: A Vector Data Management System for GIS Applications
Xuhui Liu, Shubin Zhang, Jin He, Jizhong Han, Chen...
books