Sciweavers

1748 search results - page 249 / 350
» Security Models for Heterogeneous Networking
Sort
View
135
Voted
TON
2008
155views more  TON 2008»
15 years 3 months ago
A comparative analysis of server selection in content replication networks
Server selection plays an essential role in content replication networks, such as peer-to-peer (P2P) and content delivery networks (CDNs). In this paper, we perform an analytical i...
Tao Wu, David Starobinski
USS
2008
15 years 5 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian
162
Voted
PARELEC
2000
IEEE
15 years 7 months ago
Parallel Computing Environments and Methods
Recent advances in high-speed networks, rapid improvements in microprocessor design, and availability of highly performing clustering software implementations enables cost-effecti...
Ghassan Fadlallah, Michel Lavoie, Louis-A. Dessain...
122
Voted
CLUSTER
2008
IEEE
15 years 10 months ago
Divisible load scheduling with improved asymptotic optimality
—Divisible load model allows scheduling algorithms that give nearly optimal makespan with practical computational complexity. Beaumont et al. have shown that their algorithm prod...
Reiji Suda
ICCS
2007
Springer
15 years 9 months ago
Trikonic Inter-Enterprise Architectonic
There is a need for information, application, and other enterprise architectures which are robust and flexible enough to meet the challenges of today’s heterogeneous, rapidly cha...
Gary Richmond