Sciweavers

681 search results - page 82 / 137
» Aspects for Trace Monitoring
Sort
View
PAM
2009
Springer
15 years 6 months ago
PBS: Periodic Behavioral Spectrum of P2P Applications
Abstract. Due to the significant increase of peer-to-peer (P2P) traffic in the past few years, more attentions are put on designing effective methodologies of monitoring and ide...
Tom Z. J. Fu, Yan Hu, Xingang Shi, Dah-Ming Chiu, ...
ICC
2009
IEEE
190views Communications» more  ICC 2009»
15 years 6 months ago
Protecting Location Privacy in Large-Scale Wireless Sensor Networks
—In a wireless sensor network, an adversary equipped monitoring antenna can easily overhear packets, which may facilitate identifying the directions of packet flows and trace to ...
Lei Kang
ICCS
2009
Springer
15 years 6 months ago
A Holistic Approach for Performance Measurement and Analysis for Petascale Applications
Abstract. Contemporary high-end Terascale and Petascale systems are composed of hundreds of thousands of commodity multi-core processors interconnected with high-speed custom netwo...
Heike Jagode, Jack Dongarra, Sadaf R. Alam, Jeffre...
SIGMETRICS
2009
ACM
103views Hardware» more  SIGMETRICS 2009»
15 years 6 months ago
Restrained utilization of idleness for transparent scheduling of background tasks
A common practice in system design is to treat features intended to enhance performance and reliability as low priority tasks by scheduling them during idle periods, with the goal...
Ningfang Mi, Alma Riska, Xin Li, Evgenia Smirni, E...
DSN
2008
IEEE
15 years 6 months ago
Toward an understanding of the processing delay of peer-to-peer relay nodes
Abstract—Peer-to-peer relaying is commonly used in realtime applications to cope with NAT and firewall restrictions and provide better quality network paths. As relaying is not ...
Kuan-Ta Chen, Jing-Kai Lou