Sciweavers

13180 search results - page 2489 / 2636
» Network Models
Sort
View
91
Voted
CCR
2007
69views more  CCR 2007»
15 years 3 months ago
The state of peer-to-peer simulators and simulations
In this paper, we discuss the current situation with respect to simulation usage in P2P research, testing the available P2P simulators against a proposed set of requirements, and ...
S. Naicken, B. Livingston, Anirban Basu, S. Rodhet...
IJVR
2008
125views more  IJVR 2008»
15 years 3 months ago
Intelligent Mobile Agents for Large-Scale Collaborative Virtual Environment
The Web3D technologies make it possible to create Collaborative Virtual Environment (CVE) in the popular Internet, thus promoting the popularity of CVE scientific applications to b...
Qingping Lin, Liang Zhang, Sun Ding, Guorui Feng, ...
130
Voted
IJHPCA
2006
109views more  IJHPCA 2006»
15 years 3 months ago
A Resource Leasing Policy for on-Demand Computing
Leasing computational resources for on-demand computing is now a viable option for providers of network services. Temporary spikes or lulls in demand for a service can be accommod...
Darin England, Jon B. Weissman
CORR
2007
Springer
127views Education» more  CORR 2007»
15 years 3 months ago
Attribute Exploration of Discrete Temporal Transitions
Discrete temporal transitions occur in a variety of domains, but this work is mainly motivated by applications in molecular biology: explaining and analyzing observed transcriptome...
Johannes Wollbold
JCS
2008
88views more  JCS 2008»
15 years 3 months ago
A privacy-aware access control system
The protection of privacy is an increasing concern in our networked society because of the growing amount of personal information that is being collected by a number of commercial...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
« Prev « First page 2489 / 2636 Last » Next »