Sciweavers

5723 search results - page 1076 / 1145
» Network Management
Sort
View
ESA
2007
Springer
153views Algorithms» more  ESA 2007»
15 years 2 months ago
Tradeoffs and Average-Case Equilibria in Selfish Routing
We consider the price of selfish routing in terms of tradeoffs and from an average-case perspective. Each player in a network game seeks to send a message with a certain length by...
Martin Hoefer, Alexander Souza
BTW
2009
Springer
132views Database» more  BTW 2009»
15 years 2 months ago
End-to-End Performance Monitoring of Databases in Distributed Environments
: This demonstration features the IBM DB2 Performance Expert for Linux, Unix and Windows, a high-end database monitoring tool that is capable of end-to-end monitoring in distribute...
Stefanie Scherzinger, H. Karn, T. Steinbach
97
Voted
MOBISYS
2007
ACM
15 years 10 months ago
A time-and-value centric provenance model and architecture for medical event streams
Provenance becomes a critical requirement for healthcare IT infrastructures, especially when pervasive biomedical sensors act as a source of raw medical streams for large-scale, a...
Min Wang, Marion Blount, John Davis, Archan Misra,...
AINA
2010
IEEE
15 years 4 months ago
Data Integration at Scale: From Relational Data Integration to Information Ecosystems
Our world is increasingly data-driven. The growth and value of data continue to exceed all predictions. Potential for business opportunity, economic growth, scientific discovery, ...
Michael L. Brodie
SOSP
2003
ACM
15 years 8 months ago
Upgrading transport protocols using untrusted mobile code
In this paper, we present STP, a system in which communicating end hosts use untrusted mobile code to remotely upgrade each other with the transport protocols that they use to com...
Parveen Patel, Andrew Whitaker, David Wetherall, J...
« Prev « First page 1076 / 1145 Last » Next »