Sciweavers

2402 search results - page 254 / 481
» Performance Analysis of a Distributed Question Answering Sys...
Sort
View
GIS
2010
ACM
15 years 2 months ago
Supporting location-based approximate-keyword queries
Many Web sites support keyword search on their spatial data, such as business listings and photos. In these systems, inconsistencies and errors can exist in both queries and the d...
Sattam Alsubaiee, Alexander Behm, Chen Li
OPODIS
2007
15 years 5 months ago
Small-World Networks: From Theoretical Bounds to Practical Systems
Abstract. In small-world networks, each peer is connected to its closest neighbors in the network topology, as well as to additional long-range contact(s), also called shortcut(s)....
François Bonnet, Anne-Marie Kermarrec, Mich...
ICS
2005
Tsinghua U.
15 years 9 months ago
The implications of working set analysis on supercomputing memory hierarchy design
Supercomputer architects strive to maximize the performance of scientific applications. Unfortunately, the large, unwieldy nature of most scientific applications has lead to the...
Richard C. Murphy, Arun Rodrigues, Peter M. Kogge,...
ICMCS
2005
IEEE
80views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Dynamic Server Redirect for Multimedia Service in Distributed Peer-to-Peer Network
Peer-to-Peer (P2P) multimedia application is expected to be one of the most important services supported by the next generation networks. However, how to balance server load in re...
Ming-Ho Hsiao, Suh-Yin Lee
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 10 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang