Sciweavers

5595 search results - page 1011 / 1119
» Approximation Algorithms for Clustering Problems
Sort
View
SASN
2003
ACM
15 years 10 months ago
A cooperative intrusion detection system for ad hoc networks
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerab...
Yi-an Huang, Wenke Lee
138
Voted
IPPS
2002
IEEE
15 years 10 months ago
Dominating Set Based Bluetooth Scatternet Formation with Localized Maintenance
This paper addresses the problem of scatternet formation and maintenance for multi-hop Bluetooth based personal area and ad hoc networks with minimal communication overhead. Each ...
Ivan Stojmenovic
SC
2000
ACM
15 years 9 months ago
Performance Modeling and Tuning of an Unstructured Mesh CFD Application
This paper describes performance tuning experiences with a three-dimensional unstructured grid Euler flow code from NASA, which we have reimplemented in the PETSc framework and p...
William Gropp, Dinesh K. Kaushik, David E. Keyes, ...
180
Voted
SC
2000
ACM
15 years 9 months ago
Scalable Fault-Tolerant Distributed Shared Memory
This paper shows how a state-of-the-art software distributed shared-memory (DSM) protocol can be efficiently extended to tolerate single-node failures. In particular, we extend a ...
Florin Sultan, Thu D. Nguyen, Liviu Iftode
SIGECOM
1999
ACM
202views ECommerce» more  SIGECOM 1999»
15 years 9 months ago
A methodology for workload characterization of E-commerce sites
Performance analysis and capacity planning for e-commerce sites poses an interesting problem: how to best characterize the workload of these sites. Tradition al workload character...
Daniel A. Menascé, Virgilio Almeida, Rodrig...
« Prev « First page 1011 / 1119 Last » Next »