Sciweavers

2746 search results - page 66 / 550
» Behavioral Simulations in MapReduce
Sort
View
ICCS
2004
Springer
15 years 9 months ago
Cache Oblivious Matrix Transposition: Simulation and Experiment
A cache oblivious matrix transposition algorithm is implemented and analyzed using simulation and hardware performance counters. Contrary to its name, the cache oblivious matrix tr...
D. Tsifakis, Alistair P. Rendell, Peter E. Strazdi...
IPM
2007
100views more  IPM 2007»
15 years 3 months ago
User simulations for evaluating answers to question series
Recently, question series have become one focus of research in question answering. These series are comprised of individual factoid, list, and “other” questions organized arou...
Jimmy J. Lin
133
Voted
PERCOM
2005
ACM
16 years 3 months ago
Understanding the real behavior of Mote and 802.11 ad hoc networks: an experimental approach
IEEE 802.11 and Mote devices are today two of the most interesting wireless technologies for ad hoc and sensor networks respectively, and many efforts are currently devoted to und...
Giuseppe Anastasi, Eleonora Borgia, Marco Conti, E...
ISCC
2009
IEEE
158views Communications» more  ISCC 2009»
15 years 10 months ago
Connectivity and critical point behavior in mobile ad hoc and sensor networks
— A well-known approach to increase the resilience of mobile ad hoc networks (MANETs) and unstructured sensor networks is to ensure a network topology where there are at least k ...
Tae-Hoon Kim, David Tipper, Prashant Krishnamurthy
MIDDLEWARE
2007
Springer
15 years 10 months ago
Securing peer-to-peer media streaming systems from selfish and malicious behavior
We present a flexible framework for throttling attackers in peerto-peer media streaming systems. In such systems, selfish nodes (e.g., free riders) and malicious nodes (e.g., DoS ...
William Conner, Klara Nahrstedt