Sciweavers

16128 search results - page 2953 / 3226
» Distributed network scheduling
Sort
View
CORR
2008
Springer
107views Education» more  CORR 2008»
15 years 3 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg
BMCBI
2006
117views more  BMCBI 2006»
15 years 3 months ago
The Cluster Variation Method for Efficient Linkage Analysis on Extended Pedigrees
Background: Computing exact multipoint LOD scores for extended pedigrees rapidly becomes infeasible as the number of markers and untyped individuals increase. When markers are exc...
Cornelis A. Albers, Martijn A. R. Leisink, Hilbert...
TOCHI
1998
89views more  TOCHI 1998»
15 years 3 months ago
Using Metalevel Techniques in a Flexible Toolkit for CSCW Applications
Ideally, software toolkits for collaborative applications should provide generic, reusable components, applicable in a wide range of circumstances, which software developers can as...
Paul Dourish
PE
2010
Springer
140views Optimization» more  PE 2010»
15 years 1 months ago
KPC-Toolbox: Best recipes for automatic trace fitting using Markovian Arrival Processes
We present the KPC-Toolbox, a library of MATLAB scripts for fitting workload traces into Markovian Arrival Processes (MAPs) in an automatic way based on the recently proposed Kro...
Giuliano Casale, Eddy Z. Zhang, Evgenia Smirni
142
Voted
SIGOPS
2010
130views more  SIGOPS 2010»
15 years 1 months ago
Storing and accessing live mashup content in the cloud
Today’s Rich Internet Application (RIA) technologies such as Ajax, Flex, or Silverlight, are designed around the client-server paradigm and cannot easily take advantage of repli...
Krzysztof Ostrowski, Ken Birman
« Prev « First page 2953 / 3226 Last » Next »