Sciweavers

6907 search results - page 1070 / 1382
» Securing distributed adaptation
Sort
View
GCC
2007
Springer
15 years 9 months ago
A Dynamic Quota-Based Peer Selection Strategy in BitTorrent
BitTorrent employs a static quota-based peer selection strategy to fixedly allocate upload quotas for the Tit-For-Tat (TFT) choke algorithm and Optimistic Unchoke (OU) algorithm, ...
Kun Huang, Lei Wang, Dafang Zhang, Yongwei Liu
119
Voted
HIPC
2007
Springer
15 years 9 months ago
Experiments with a Parallel External Memory System
Abstract. The theory of bulk-synchronous parallel computing has produced a large number of attractive algorithms, which are provably optimal in some sense, but typically require th...
Mohammad R. Nikseresht, David A. Hutchinson, Anil ...
HOLOMAS
2007
Springer
15 years 9 months ago
Agent Methods for Network Intrusion Detection and Response
While the need to build the Intrusion Detection Systems (IDS) based on on a distributed and cooperative (P2P) paradigm is being generally acknowledged, the field has been disconne...
Martin Rehák, Michal Pechoucek, David Medvi...
130
Voted
IESS
2007
Springer
116views Hardware» more  IESS 2007»
15 years 9 months ago
Utilizing Reconfigurable Hardware to Optimize Workflows in Networked Nodes
This work investigates the use of reconfigurable devices as computing platform for self-organizing embedded systems. Those usually consist of a set of distributed, autonomous node...
Dominik Murr, Felix Mühlbauer, Falko Dressler...
MIDDLEWARE
2007
Springer
15 years 9 months ago
Vector-Field Consistency for Ad-Hoc Gaming
Abstract. Developing distributed multiplayer games for ad-hoc networks is challenging. Consistency of the replicated shared state is hard to ensure at a low cost. Current consisten...
Nuno Santos, Luís Veiga, Paulo Ferreira
« Prev « First page 1070 / 1382 Last » Next »