Sciweavers

15254 search results - page 72 / 3051
» A k
Sort
View
SIGCOMM
2009
ACM
15 years 4 months ago
Experiences in emulating 10K AS topology with massive VM multiplexing
Shinsuke Miwa, Mio Suzuki, Hiroaki Hazeyama, Satos...
HICSS
2008
IEEE
151views Biometrics» more  HICSS 2008»
15 years 4 months ago
Using k-Pricing for Penalty Calculation in Grid Market
To distribute risk in Grid, the design of service level agreements (SLAs) plays an important role, since these contracts determine the price for a service at an agreed quality lev...
Michael Becker, Nikolay Borrisov, Vikas Deora, Ome...
ICC
2008
IEEE
176views Communications» more  ICC 2008»
15 years 4 months ago
A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics
— Keystroke dynamics exhibit people’s behavioral features which are similar to hand signatures. A major problem hindering the large scale deployment of this technology is its h...
Jiankun Hu, Don Gingrich, Andy Sentosa
ICDCS
2008
IEEE
15 years 4 months ago
Fair K Mutual Exclusion Algorithm for Peer to Peer Systems
k-mutual exclusion is an important problem for resourceintensive peer-to-peer applications ranging from aggregation to file downloads. In order to be practically useful, k-mutual...
Vijay Anand Reddy, Prateek Mittal, Indranil Gupta