Sciweavers

2605 search results - page 269 / 521
» Reliability-aware scalability models for high performance co...
Sort
View
RAID
2004
Springer
15 years 10 months ago
On the Design and Use of Internet Sinks for Network Abuse Monitoring
Abstract. Monitoring unused or dark IP addresses offers opportunities to significantly improve and expand knowledge of abuse activity without many of the problems associated with ...
Vinod Yegneswaran, Paul Barford, David Plonka
176
Voted
OSDI
2004
ACM
16 years 4 months ago
MapReduce: Simplified Data Processing on Large Clusters
MapReduce is a programming model and an associated implementation for processing and generating large data sets. Users specify a map function that processes a key/value pair to ge...
Jeffrey Dean, Sanjay Ghemawat
155
Voted
EUROPAR
2010
Springer
15 years 5 months ago
cTrust: Trust Aggregation in Cyclic Mobile Ad Hoc Networks
In a Cyclic Mobile Ad Hoc Network (CMANET) where nodes move cyclically, we formulate trust management problems and propose the cTrust scheme to handle trust establishment and aggre...
Huanyu Zhao, Xin Yang, Xiaolin Li
125
Voted
CVPR
2007
IEEE
16 years 6 months ago
Real-time Gesture Recognition with Minimal Training Requirements and On-line Learning
In this paper, we introduce the semantic network model (SNM), a generalization of the hidden Markov model (HMM) that uses factorization of state transition probabilities to reduce...
Stjepan Rajko, Gang Qian, Todd Ingalls, Jodi James
157
Voted
ICC
2007
IEEE
114views Communications» more  ICC 2007»
15 years 11 months ago
Hierarchical and Breathing Peer-to-Peer SIP System
—The combination of the SIP-based service and Peer-to-Peer (P2P) can improve the performance of traditional client-server SIP system. However, current P2P SIP systems have many d...
Lifeng Le, Geng-Sheng Kuo