Sciweavers

2863 search results - page 523 / 573
» Constructing minimum-interference networks
Sort
View
IJHPCA
2006
77views more  IJHPCA 2006»
15 years 1 months ago
An Interoperability Approach to System Software, Tools, and Libraries for Clusters
Systems software for clusters typically derives from a multiplicity of sources: the kernel itself, software associated with a particular distribution, site-specific purchased or o...
Ewing L. Lusk, Narayan Desai, Rick Bradshaw, Andre...
ISI
2006
Springer
15 years 1 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
JNW
2008
103views more  JNW 2008»
15 years 1 months ago
Avoidance Mechanism of Redundant Transmissions in Content Cruising System
"Content Cruising System (CCS)" is developed as a decentralized and autonomous distribution system for location-based contents. The content put into CCS carries itself to...
Takaaki Ishida, Keijiro Ehara, Seiichiro Toda, Yas...
JSA
2008
81views more  JSA 2008»
15 years 1 months ago
Improving stability for peer-to-peer multicast overlays by active measurements
The instability of the tree-like multicast overlay caused by nodes' abrupt departures is considered as one of the major problems for peer-to-peer (P2P) multicast systems. In ...
Ye Tian, Di Wu, Guangzhong Sun, Kam-Wing Ng
JPDC
2006
175views more  JPDC 2006»
15 years 1 months ago
Stochastic modeling and analysis of hybrid mobility in reconfigurable distributed virtual machines
Virtualization provides a vehicle to manage the available resources and enhance their utilization in network computing. System dynamics requires virtual machines be distributed an...
Song Fu, Cheng-Zhong Xu