Sciweavers

6907 search results - page 1070 / 1382
» Securing distributed adaptation
Sort
View
GCC
2007
Springer
15 years 5 months ago
A Dynamic Quota-Based Peer Selection Strategy in BitTorrent
BitTorrent employs a static quota-based peer selection strategy to fixedly allocate upload quotas for the Tit-For-Tat (TFT) choke algorithm and Optimistic Unchoke (OU) algorithm, ...
Kun Huang, Lei Wang, Dafang Zhang, Yongwei Liu
86
Voted
HIPC
2007
Springer
15 years 5 months ago
Experiments with a Parallel External Memory System
Abstract. The theory of bulk-synchronous parallel computing has produced a large number of attractive algorithms, which are provably optimal in some sense, but typically require th...
Mohammad R. Nikseresht, David A. Hutchinson, Anil ...
HOLOMAS
2007
Springer
15 years 5 months ago
Agent Methods for Network Intrusion Detection and Response
While the need to build the Intrusion Detection Systems (IDS) based on on a distributed and cooperative (P2P) paradigm is being generally acknowledged, the field has been disconne...
Martin Rehák, Michal Pechoucek, David Medvi...
IESS
2007
Springer
116views Hardware» more  IESS 2007»
15 years 5 months ago
Utilizing Reconfigurable Hardware to Optimize Workflows in Networked Nodes
This work investigates the use of reconfigurable devices as computing platform for self-organizing embedded systems. Those usually consist of a set of distributed, autonomous node...
Dominik Murr, Felix Mühlbauer, Falko Dressler...
MIDDLEWARE
2007
Springer
15 years 5 months ago
Vector-Field Consistency for Ad-Hoc Gaming
Abstract. Developing distributed multiplayer games for ad-hoc networks is challenging. Consistency of the replicated shared state is hard to ensure at a low cost. Current consisten...
Nuno Santos, Luís Veiga, Paulo Ferreira
« Prev « First page 1070 / 1382 Last » Next »