Sciweavers

12375 search results - page 2473 / 2475
» Application networking on peer-to-peer networks
Sort
View
CORR
2011
Springer
174views Education» more  CORR 2011»
14 years 4 months ago
Physical expander in Virtual Tree Overlay
Abstract. In this paper, we propose a new construction of constantdegree expanders motivated by their application in P2P overlay networks and in particular in the design of robust ...
Taisuke Izumi, Maria Potop-Butucaru, Mathieu Valer...
CCGRID
2011
IEEE
14 years 1 months ago
High Performance Pipelined Process Migration with RDMA
—Coordinated Checkpoint/Restart (C/R) is a widely deployed strategy to achieve fault-tolerance. However, C/R by itself is not capable enough to meet the demands of upcoming exasc...
Xiangyong Ouyang, Raghunath Rajachandrasekar, Xavi...
CORR
2011
Springer
199views Education» more  CORR 2011»
14 years 1 months ago
Surrogate Parenthood: Protected and Informative Graphs
Many applications, including provenance and some analyses of social networks, require path-based queries over graphstructured data. When these graphs contain sensitive information...
Barbara T. Blaustein, Adriane Chapman, Len Seligma...
INFOCOM
2011
IEEE
14 years 1 months ago
WiZi-Cloud: Application-transparent dual ZigBee-WiFi radios for low power internet access
Abstract—The high density of WiFi Access Points and large unlicensed RF bandwidth over which they operate makes them good candidates to alleviate cellular network’s limitations...
Tao Jin, Guevara Noubir, Bo Sheng
ACISP
1997
Springer
15 years 2 months ago
Enabling Technology for the Trading of MPEG-encoded Video
tracts, pp. 11-17. (http://www.qucis.queens.ca/achallc97/papers/p028.html) Alexa, Melina; Rostek, Lothar Pattern Concordances - TATOE calls XGrammar. Presented at ACH -ALLC97, King...
Jana Dittmann, Arnd Steinmetz
« Prev « First page 2473 / 2475 Last » Next »