Sciweavers

1030 search results - page 187 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
87
Voted
WWW
2005
ACM
15 years 10 months ago
On the lack of typical behavior in the global Web traffic network
We offer the first large-scale analysis of Web traffic based on network flow data. Using data collected on the Internet2 network, we constructed a weighted bipartite clientserver ...
Mark Meiss, Filippo Menczer, Alessandro Vespignani
EDCC
2010
Springer
15 years 2 months ago
D2HT: The Best of Both Worlds, Integrating RPS and DHT
Distributed Hash Tables (DHTs) and Random Peer Sampling (RPS) provide important and complementary services in the area of P2P overlay networks. DHTs achieve efficient lookup whil...
Marin Bertier, François Bonnet, Anne-Marie ...
ACSC
2006
IEEE
15 years 3 months ago
A JMX toolkit for merging network management systems
The ever increasing size of networks has resulted in a corresponding escalation of administration costs and lengthy deployment cycles. Clearly, more scalable and flexible network...
Feng Lu, Kris Bubendorfer
MIDDLEWARE
2004
Springer
15 years 3 months ago
Adaptive resource discovery for ubiquitous computing
The terms pervasive and ubiquitous computing are used to describe a smart space populated by hundreds of intelligent devices that are embedded in their surroundings. Characteristi...
Rae Harbird, Stephen Hailes, Cecilia Mascolo
62
Voted
ATAL
2007
Springer
15 years 3 months ago
Distributed task allocation in social networks
This paper proposes a new variant of the task allocation problem, where the agents are connected in a social network and tasks arrive at the agents distributed over the network. W...
Mathijs de Weerdt, Yingqian Zhang, Tomas Klos