Sciweavers

3265 search results - page 514 / 653
» Distributed Slicing in Dynamic Systems
Sort
View
129
Voted
ICPP
2008
IEEE
15 years 10 months ago
Scalable Techniques for Transparent Privatization in Software Transactional Memory
—We address the recently recognized privatization problem in software transactional memory (STM) runtimes, and introduce the notion of partially visible reads (PVRs) to heuristic...
Virendra J. Marathe, Michael F. Spear, Michael L. ...
143
Voted
IPPS
2008
IEEE
15 years 10 months ago
An effective pointer replication algorithm in P2P networks
Peer-to-Peer (P2P) networks have proven to be an efficient and successful mechanism for file sharing over the Internet. However, current P2P protocols have long worst case query...
Jian Zhou, Laxmi N. Bhuyan, Anirban Banerjee
110
Voted
HICSS
2007
IEEE
119views Biometrics» more  HICSS 2007»
15 years 10 months ago
Collection of U.S. Extremist Online Forums: A Web Mining Approach
Extremists’ exploitation of computer-mediated communications such as online forums has recently gained much attention from academia and the government. However, due to the cover...
Yilu Zhou, Jialun Qin, Guanpi Lai, Hsinchun Chen
115
Voted
ICPADS
2007
IEEE
15 years 10 months ago
Statistical trust establishment in wireless sensor networks
Abstract— We present a new distributed approach that establishes reputation-based trust among sensor nodes in order to identify malfunctioning and malicious sensor nodes and mini...
Matthew J. Probst, Sneha Kumar Kasera
124
Voted
IPPS
2007
IEEE
15 years 10 months ago
Using Speed Diagrams for Symbolic Quality Management
We present a quality management method for multimedia applications. The method takes as input an application software composed of actions. The execution times of actions are unkno...
Jacques Combaz, Jean-Claude Fernandez, Joseph Sifa...