Sciweavers

491 search results - page 64 / 99
» Data communication estimation and reduction for reconfigurab...
Sort
View
INFOCOM
2006
IEEE
15 years 8 months ago
The Index Poisoning Attack in P2P File Sharing Systems
— P2P file-sharing systems have indexes, which users search to find locations of desired titles. In the index poisoning attack, the attacker inserts massive numbers of bogus re...
Jian Liang, Naoum Naoumov, Keith W. Ross
WAN
1998
Springer
15 years 5 months ago
Performance Analysis of Wavefront Algorithms on Very-Large Scale Distributed Systems
We present a model for the parallel performance of algorithms that consist of concurrent, two-dimensional wavefronts implemented in a message passing environment. The model combine...
Adolfy Hoisie, Olaf M. Lubeck, Harvey J. Wasserman
ICT
2004
Springer
194views Communications» more  ICT 2004»
15 years 7 months ago
Competitive Neural Networks for Fault Detection and Diagnosis in 3G Cellular Systems
We propose a new approach to fault detection and diagnosis in third-generation (3G) cellular networks using competitive neural algorithms. For density estimation purposes, a given ...
Guilherme De A. Barreto, João Cesar M. Mota...
MOBISYS
2009
ACM
16 years 2 months ago
Fidelity-aware replication for mobile devices
Mobile devices often store data in reduced resolutions or custom formats in order to accommodate resource constraints and tailormade software. The Polyjuz framework enables sharin...
Kaushik Veeraraghavan, Venugopalan Ramasubramanian...
HPDC
2008
IEEE
15 years 2 months ago
Eliminating the middleman: peer-to-peer dataflow
Efficiently executing large-scale, data-intensive workflows such as Montage must take into account the volume and pattern of communication. When orchestrating data-centric workflo...
Adam Barker, Jon B. Weissman, Jano I. van Hemert