Sciweavers

1510 search results - page 209 / 302
» Secure Distributed Data Aggregation
Sort
View
102
Voted
USENIX
1994
15 years 3 months ago
Experiences with a Survey Tool for Discovering Network Time Protocol Servers
The Network Time Protocol (NTP) is widely used to synchronize computer clocks throughout the Internet. Existing NTP clients and servers form a very large distributed system, and y...
James D. Guyton, Michael F. Schwartz
DSRT
2009
IEEE
15 years 9 months ago
Human Flesh Search Model Incorporating Network Expansion and GOSSIP with Feedback
—With the development of on-line forum technology and the pervasive participation of the public, the Human Flesh Search is becoming an arising phenomenon which makes a great impa...
Bing Wang, Bonan Hou, Yiping Yao, Laibin Yan
125
Voted
ICDCS
2008
IEEE
15 years 8 months ago
Fair K Mutual Exclusion Algorithm for Peer to Peer Systems
k-mutual exclusion is an important problem for resourceintensive peer-to-peer applications ranging from aggregation to file downloads. In order to be practically useful, k-mutual...
Vijay Anand Reddy, Prateek Mittal, Indranil Gupta
117
Voted
ICDCS
2007
IEEE
15 years 8 months ago
Iso-Map: Energy-Efficient Contour Mapping in Wireless Sensor Networks
Contour mapping is a crucial part of many wireless sensor network applications. Many efforts have been made to avoid collecting data from all the sensors in the network and produc...
Yunhao Liu, Mo Li
79
Voted
IPPS
2007
IEEE
15 years 8 months ago
Automatic MPI application transformation with ASPhALT
This paper describes a source to source compilation tool for optimizing MPI-based parallel applications. This tool is able to automatically apply a “prepushing” transformation...
Anthony Danalis, Lori L. Pollock, D. Martin Swany