Sciweavers

2847 search results - page 514 / 570
» Dynamic Distribution of Java Applications
Sort
View
134
Voted
JCP
2008
125views more  JCP 2008»
15 years 2 months ago
Comparative Analysis of Resource Discovery Approaches in Grid Computing
Grid technologies enable the sharing of a wide variety of distributed resources. To utilize these resources, effective Resource Management systems are needed. Resource Management s...
Anju Sharma, Seema Bawa
130
Voted
JSA
2006
113views more  JSA 2006»
15 years 2 months ago
A power-efficient TCAM architecture for network forwarding tables
Stringent memory access and search speed requirements are two of the main bottlenecks in wire speed processing. Most viable search engines are implemented in content addressable m...
Taskin Koçak, Faysal Basci
135
Voted
JSAC
2006
137views more  JSAC 2006»
15 years 2 months ago
Adaptive Defense Against Various Network Attacks
In defending against various network attacks, such as distributed denial-of-service (DDoS) attacks or worm attacks, a defense system needs to deal with various network conditions a...
Cliff Changchun Zou, Nick G. Duffield, Donald F. T...
PE
2008
Springer
106views Optimization» more  PE 2008»
15 years 2 months ago
Heavy traffic analysis of polling models by mean value analysis
In this paper we present a new approach to derive heavy-traffic asymptotics for polling models. We consider the classical cyclic polling model with exhaustive or gated service at ...
Robert D. van der Mei, Erik M. M. Winands
SIGKDD
2008
149views more  SIGKDD 2008»
15 years 2 months ago
Knowledge discovery from sensor data (SensorKDD)
Wide-area sensor infrastructures, remote sensors, RFIDs, and wireless sensor networks yield massive volumes of disparate, dynamic, and geographically distributed data. As such sen...
Ranga Raju Vatsavai, Olufemi A. Omitaomu, Joao Gam...