Sciweavers

23557 search results - page 4270 / 4712
» Distributed Computing - Introduction
Sort
View
123
Voted
FUIN
2006
96views more  FUIN 2006»
15 years 4 months ago
A Component Coordination Model Based on Mobile Channels
In this paper we present a coordination model for component-based software systems based on the notion of mobile channels, define it in terms of a compositional trace-based semanti...
Juan Guillen Scholten, Farhad Arbab, Frank S. de B...
CN
2007
94views more  CN 2007»
15 years 4 months ago
Modeling and generating realistic streaming media server workloads
Currently, Internet hosting centers and content distribution networks leverage statistical multiplexing to meet the performance requirements of a number of competing hosted networ...
Wenting Tang, Yun Fu, Ludmila Cherkasova, Amin Vah...
130
Voted
CN
2007
108views more  CN 2007»
15 years 4 months ago
On the peninsula phenomenon in web graph and its implications on web search
Web masters usually place certain web pages such as home pages and index pages in front of others. Under such a design, it is necessary to go through some pages to reach the desti...
Tao Meng, Hong-Fei Yan
CN
2007
90views more  CN 2007»
15 years 4 months ago
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots
As next-generation computer worms may spread within minutes to millions of hosts, protection via human intervention is no longer an option. We discuss the implementation of SweetB...
Georgios Portokalidis, Herbert Bos
CN
2007
172views more  CN 2007»
15 years 4 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
« Prev « First page 4270 / 4712 Last » Next »