Sciweavers

1656 search results - page 253 / 332
» Building Dependable Distributed Applications Using AQUA
Sort
View
142
Voted
COMCOM
1998
106views more  COMCOM 1998»
15 years 2 months ago
Algorithms for delay-constrained low-cost multicast tree construction
With the proliferation of multimedia group applications, the construction of multicast trees satisfying Quality of Service QoS requirements is becoming a problem of prime import...
R. Sriram, Govindarasu Manimaran, C. Siva Ram Murt...
135
Voted
CCS
2010
ACM
15 years 1 months ago
Designs to account for trust in social network-based sybil defenses
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs...
Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim
109
Voted
MONET
2008
129views more  MONET 2008»
15 years 1 months ago
Link Layer Adaptation for Shared Wireless Links
While traditional link layer protocols assume that they fully control the underlying link, in contemporary wireless networks the link may be dynamically shared by sessions belongin...
George Xylomenos, Michael Makidis
127
Voted
ISSTA
2006
ACM
15 years 8 months ago
The case for analysis preserving language transformation
Static analysis has gained much attention over the past few years in applications such as bug finding and program verification. As software becomes more complex and componentize...
Xiaolan Zhang, Larry Koved, Marco Pistoia, Sam Web...
127
Voted
TON
2008
126views more  TON 2008»
15 years 2 months ago
Hyperbolic embedding of internet graph for distance estimation and overlay construction
Estimating distances in the Internet has been studied in the recent years due to its ability to improve the performance of many applications, e.g., in the peer-topeer realm. One sc...
Yuval Shavitt, Tomer Tankel