Sciweavers

21324 search results - page 3839 / 4265
» Making the case for computing
Sort
View
DIALM
2010
ACM
194views Algorithms» more  DIALM 2010»
15 years 2 months ago
Prioritized gossip in vehicular networks
We present a method for using real world mobility traces to identify tractable theoretical models for the study of distributed algorithms in mobile networks. We validate the metho...
Alejandro Cornejo, Calvin C. Newport
IMC
2010
ACM
15 years 2 months ago
What happened in my network: mining network events from router syslogs
Router syslogs are messages that a router logs to describe a wide range of events observed by it. They are considered one of the most valuable data sources for monitoring network ...
Tongqing Qiu, Zihui Ge, Dan Pei, Jia Wang, Jun Xu
IMC
2010
ACM
15 years 2 months ago
Network tomography on correlated links
Network tomography establishes linear relationships between the characteristics of individual links and those of end-toend paths. It has been proved that these relationships can b...
Denisa Ghita, Katerina J. Argyraki, Patrick Thiran
IPPS
2010
IEEE
15 years 2 months ago
Modeling and analyzing the effects of firewalls and NATs in P2P swarming systems
Many P2P systems have been designed without taking into account an important factor: a large fraction of Internet users nowadays are located behind a network address translator (NA...
Lucia D'Acunto, Michel Meulpolder, Rameez Rahman, ...
IPPS
2010
IEEE
15 years 2 months ago
Broadcasting on large scale heterogeneous platforms under the bounded multi-port model
We consider the problem of broadcasting a large message in a large scale distributed platform. The message must be sent from a source node, with the help of the receiving peers whi...
Olivier Beaumont, Lionel Eyraud-Dubois, Shailesh K...
« Prev « First page 3839 / 4265 Last » Next »