Sciweavers

1152 search results - page 106 / 231
» Communication management using abstraction in distributed ba...
Sort
View
CCS
2008
ACM
14 years 12 months ago
A look in the mirror: attacks on package managers
This work studies the security of ten popular package managers. These package managers use different security mechanisms that provide varying levels of usability and resilience to...
Justin Cappos, Justin Samuel, Scott M. Baker, John...
INFOCOM
2002
IEEE
15 years 2 months ago
Optimal Rate Allocation and Traffic Splits for Energy Efficient Routing in Ad Hoc Networks
Abstract— In this paper, we address the problem of providing traffic quality of service and energy efficiency in ad hoc wireless networks. We consider a network that is shared ...
Vikram Srinivasan, Carla-Fabiana Chiasserini, Pava...
ICA3PP
2005
Springer
15 years 3 months ago
Mining Traces of Large Scale Systems
Abstract— Large scale distributed computing infrastructure captures the use of high number of nodes, poor communication performance and continously varying resources that are not...
Christophe Cérin, Michel Koskas
DEBS
2008
ACM
14 years 11 months ago
Availability models for underlay aware overlay networks
Availability of an overlay network is a necessary condition for event delivery in event based systems. The availability of the overlay links depends on the underlying physical net...
Madhu Kumar SD, Umesh Bellur
SAC
2009
ACM
15 years 2 months ago
Latency-aware leader election
Experimental studies have shown that electing a leader based on measurements of the underlying communication network can be beneficial. We use this approach to study the problem ...
Nuno Santos, Martin Hutle, André Schiper