Sciweavers

8080 search results - page 1578 / 1616
» From Computer Networks to Agent Networks
Sort
View
IPPS
2009
IEEE
15 years 4 months ago
Input-independent, scalable and fast string matching on the Cray XMT
String searching is at the core of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filters. The growing size of o...
Oreste Villa, Daniel G. Chavarría-Miranda, ...
MHCI
2009
Springer
15 years 4 months ago
Information empowerment through mobile learning
Information empowers those who make sense from its successful interpretation; this is especially true on the subject of weather where the recipient is required to have prior forms...
Raymond Koon Chuan Koh, Henry Xin Liong Tan, Henry...
CLUSTER
2008
IEEE
15 years 4 months ago
DLM: A distributed Large Memory System using remote memory swapping over cluster nodes
Abstract—Emerging 64bitOS’s supply a huge amount of memory address space that is essential for new applications using very large data. It is expected that the memory in connect...
Hiroko Midorikawa, Motoyoshi Kurokawa, Ryutaro Him...
COLCOM
2008
IEEE
15 years 4 months ago
Data Quality and Failures Characterization of Sensing Data in Environmental Applications
Environmental monitoring is one of the most important sensor network application domains. The success of those applications is determined by the quality of the collected data. Thu...
Kewei Sha, Guoxing Zhan, Safwan Al-Omari, Tim Cala...
ICDCSW
2008
IEEE
15 years 4 months ago
On Feasibility of P2P On-Demand Streaming via Empirical VoD User Behavior Analysis
—In its current art, peer-to-peer streaming solution has been mainly employed in the domain of live event broadcasting. In such a paradigm, users are required to simultaneously p...
Bin Chang, Liang Dai, Yi Cui, Yuan Xue
« Prev « First page 1578 / 1616 Last » Next »