Sciweavers

260 search results - page 26 / 52
» Reliable Communication Infrastructure for Adaptive Data Repl...
Sort
View
P2P
2009
IEEE
114views Communications» more  P2P 2009»
15 years 4 months ago
Why Kad Lookup Fails
A Distributed Hash Table (DHT) is a structured overlay network service that provides a decentralized lookup for mapping objects to locations. In this paper, we study the lookup pe...
Hun Jeong Kang, Eric Chan-Tin, Nicholas Hopper, Yo...
ICC
2007
IEEE
111views Communications» more  ICC 2007»
15 years 4 months ago
Security in All-Optical Networks: Self-Organization and Attack Avoidance
—While transparent WDM optical networks become more and more popular as the basis of the Next Generation Internet (NGI) infrastructure, such networks raise many unique security i...
Jae-Seung Yeom, Ozan K. Tonguz, Gerardo A. Casta&n...
ASPLOS
2004
ACM
15 years 3 months ago
Low-overhead memory leak detection using adaptive statistical profiling
Sampling has been successfully used to identify performance optimization opportunities. We would like to apply similar techniques to check program correctness. Unfortunately, samp...
Matthias Hauswirth, Trishul M. Chilimbi
ICDCS
2009
IEEE
15 years 6 months ago
A Practical Study of Regenerating Codes for Peer-to-Peer Backup Systems
In distributed storage systems, erasure codes represent an attractive solution to add redundancy to stored data while limiting the storage overhead. They are able to provide the s...
Alessandro Duminuco, Ernst W. Biersack
ICC
2007
IEEE
120views Communications» more  ICC 2007»
15 years 4 months ago
An Event-Detection Estimation Model for Hybrid Adaptive Routing in WSNs
— A fundamental goal of a wireless sensor network (WSN) is to collect and deliver data to external applications. Due to the strong constraints of these networks, routing algorith...
Carlos Mauricio S. Figueiredo, Eduardo Freire Naka...