Sciweavers

6303 search results - page 1103 / 1261
» A Generated Management for Distributed Systems
Sort
View
92
Voted
SAC
2004
ACM
15 years 6 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
WIDM
2004
ACM
15 years 6 months ago
XPath lookup queries in P2P networks
We address the problem of querying XML data over a P2P network. In P2P networks, the allowed kinds of queries are usually exact-match queries over file names. We discuss the exte...
Angela Bonifati, Ugo Matrangolo, Alfredo Cuzzocrea...
107
Voted
GRID
2004
Springer
15 years 6 months ago
Memory Conscious Task Partition and Scheduling in Grid Environments
While resource management and task scheduling are identified challenges of Grid computing, current Grid scheduling systems mainly focus on CPU and network availability. Recent per...
Ming Wu, Xian-He Sun
103
Voted
ISPA
2004
Springer
15 years 6 months ago
Context-Awareness in Mobile Web Services
Context-aware computing is a computing paradigm in which applications can take advantage of contextual information. Quality of network connection is a very important factor for mob...
Bo Han, Weijia Jia, Ji Shen, Man-Ching Yuen
KDD
2004
ACM
137views Data Mining» more  KDD 2004»
15 years 6 months ago
Mining scale-free networks using geodesic clustering
Many real-world graphs have been shown to be scale-free— vertex degrees follow power law distributions, vertices tend to cluster, and the average length of all shortest paths is...
Andrew Y. Wu, Michael Garland, Jiawei Han
« Prev « First page 1103 / 1261 Last » Next »