Sciweavers

5234 search results - page 933 / 1047
» Simulation of Computer Network Attacks
Sort
View
DSRT
2003
IEEE
15 years 8 months ago
Real Time Inspection of Hidden Worlds
“Smart Things” are commonly understood as wireless ad-hoc networked, mobile, autonomous, special purpose computing appliances, usually interacting with their environment impli...
Alois Ferscha, Markus Keller
143
Voted
ICPP
2002
IEEE
15 years 8 months ago
Optimal Video Replication and Placement on a Cluster of Video-on-Demand Servers
A cost-effective approach to building up scalable Videoon-Demand (VoD) servers is to couple a number of VoD servers together in a cluster. In this article, we study a crucial vide...
Xiaobo Zhou, Cheng-Zhong Xu
CODES
2006
IEEE
15 years 7 months ago
Automatic phase detection for stochastic on-chip traffic generation
During System on Chip (SoC) design, Network on Chip (NoC) prototyping is used for adapting NoC parameters to the application running on the chip. This prototyping is currently don...
Antoine Scherrer, Antoine Fraboulet, Tanguy Risset
124
Voted
SP
2002
IEEE
129views Security Privacy» more  SP 2002»
15 years 3 months ago
The XCAT Science Portal
The design and prototype implementation of the XCAT Grid Science Portal is described in this paper. The portal lets grid application programmers easily script complex distributed ...
Sriram Krishnan, Randall Bramley, Dennis Gannon, R...
146
Voted
IAT
2010
IEEE
15 years 1 months ago
Using Negotiation to Reduce Redundant Autonomous Mobile Program Movements
Distributed load managers exhibit thrashing where tasks are repeatedly moved between locations due to incomplete global load information. This paper shows that systems of Autonomou...
Natalia Chechina, Peter King, Phil Trinder