Sciweavers

1869 search results - page 298 / 374
» Analysis of Network Processing Workloads
Sort
View
ADHOC
2008
95views more  ADHOC 2008»
15 years 3 months ago
The polarized gossip protocol for path discovery in MANETs
In this paper we present a novel probabilistic protocol for path discovery in Mobile Ad Hoc Networks (MANETs). The protocol implements what we call a polarized gossiping algorithm...
Roberto Beraldi
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
15 years 9 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
142
Voted
ICPP
2007
IEEE
15 years 9 months ago
Towards Location-aware Topology in both Unstructured and Structured P2P Systems
A self-organizing peer-to-peer system is built upon an application level overlay, whose topology is independent of underlying physical network. A well-routed message path in such ...
Tongqing Qiu, Guihai Chen, Mao Ye, Edward Chan, Be...
IJCNN
2007
IEEE
15 years 9 months ago
Predicting Spike Activity in Neuronal Cultures
be regarded as an abstraction of the underlying effective network connectivity, i.e. its functional connectivity. Although similar functional connectivity models have been describe...
Tayfun Gürel, Ulrich Egert, Steffen Kandler, ...
ICDCSW
2006
IEEE
15 years 9 months ago
Dimension-Based Subscription Pruning for Publish/Subscribe Systems
Subscription pruning has been proven as valuable routing optimization for Boolean subscriptions in publish/subscribe systems. It aims at optimizing subscriptions independently of ...
Sven Bittner, Annika Hinze