Sciweavers

7683 search results - page 1383 / 1537
» Distributed Computing with the CLAN Network
Sort
View
P2P
2005
IEEE
112views Communications» more  P2P 2005»
15 years 9 months ago
Randomized Protocols for Duplicate Elimination in Peer-to-Peer Storage Systems
Distributed peer-to-peer systems rely on voluntary participation of peers to effectively manage a storage pool. In such systems, data is generally replicated for performance and a...
Ronaldo A. Ferreira, Murali Krishna Ramanathan, An...
QSHINE
2005
IEEE
15 years 9 months ago
A Per-Class QoS Service Model in IEEE 802.11e WLANs
Abstract -- In this paper, we study the provision of perclass QoS for IEEE 802.11e Enhanced Distributed Channel Access (EDCA) WLANs. We propose two mechanisms, called BIWF-SP and I...
Jeng Farn Lee, Wanjiun Liao, Meng Chang Chen
WORDS
2005
IEEE
15 years 9 months ago
An Adaptable Security Framework for Service-based Systems
A major advantage of service-based computing technology is the ability to enable rapid formation of large-scale distributed systems by composing massively available services to ac...
Stephen S. Yau, Yisheng Yao, Zhaoji Chen, Luping Z...
SIGECOM
2005
ACM
98views ECommerce» more  SIGECOM 2005»
15 years 9 months ago
Hidden-action in multi-hop routing
In multi-hop networks, the actions taken by individual intermediate nodes are typically hidden from the communicating endpoints; all the endpoints can observe is whether or not th...
Michal Feldman, John Chuang, Ion Stoica, Scott She...
EUROPAR
2005
Springer
15 years 9 months ago
An Approach to Performance Prediction for Parallel Applications
Abstract. Accurately modeling and predicting performance for largescale applications becomes increasingly difficult as system complexity scales dramatically. Analytic predictive mo...
Engin Ipek, Bronis R. de Supinski, Martin Schulz, ...
« Prev « First page 1383 / 1537 Last » Next »