Sciweavers

7544 search results - page 1408 / 1509
» Network Forensics Analysis
Sort
View
IPPS
2007
IEEE
15 years 10 months ago
A Performance Prediction Framework for Grid-Based Data Mining Applications
For a grid middleware to perform resource allocation, prediction models are needed, which can determine how long an application will take for completion on a particular platform o...
Leonid Glimcher, Gagan Agrawal
AIME
2007
Springer
15 years 10 months ago
An Intelligent Aide for Interpreting a Patient's Dialysis Data Set
Many machines used in the modern hospital settings offer real time physiological monitoring. Haemodialysis machines combine a therapeutic treatment system integrated with sophistic...
Derek H. Sleeman, Nick Fluck, Elias Gyftodimos, La...
140
Voted
GECCO
2007
Springer
177views Optimization» more  GECCO 2007»
15 years 10 months ago
Takeover times on scale-free topologies
The topological properties of a network directly impact the flow of information through a system. In evolving populations, the topology of inter-individual interactions affects th...
Joshua L. Payne, Margaret J. Eppstein
ICDCS
2006
IEEE
15 years 10 months ago
ASAP: an AS-Aware Peer-Relay Protocol for High Quality VoIP
Peer-to-peer (P2P) technology has been successfully applied in Internet telephony or Voice over Internet Protocol (VoIP), such as the Skype system, where P2P is used for both sear...
Shansi Ren, Lei Guo, Xiaodong Zhang
P2P
2006
IEEE
153views Communications» more  P2P 2006»
15 years 10 months ago
Internet-Scale Storage Systems under Churn -- A Study of the Steady-State using Markov Models
Content storage in a distributed collaborative environment uses redundancy for better resilience and thus provides good availability and durability. In a peer-to-peer environment,...
Anwitaman Datta, Karl Aberer
« Prev « First page 1408 / 1509 Last » Next »