Sciweavers

5234 search results - page 957 / 1047
» Simulation of Computer Network Attacks
Sort
View
116
Voted
IEEEARES
2006
IEEE
15 years 9 months ago
Fair Trading of Information: A Proposal for the Economics of Peer-to-Peer Systems
A P2P currency can be a powerful tool for promoting exchanges in a trusted way that make use of under-utilized resources both in computer networks and in real life. There are thre...
Kenji Saito, Eiichi Morino, Jun Murai
IPPS
2006
IEEE
15 years 9 months ago
A distributed paging RAM grid system for wide-area memory sharing
Memory-intensive applications often suffer from the poor performance of disk swapping when memory is inadequate. Remote memory sharing schemes, which provide a remote memory that ...
Rui Chu, Nong Xiao, Yongzhen Zhuang, Yunhao Liu, X...
105
Voted
HPDC
1998
IEEE
15 years 7 months ago
Personal Tele-Immersion Devices
The Electronic Visualization Laboratory (EVL) at the University of Illinois at Chicago (UIC) has partnered with dozens of computational scientists and engineers to create visualiz...
Thomas A. DeFanti, Daniel J. Sandin, Gregory Dawe,...
VRML
1997
ACM
15 years 7 months ago
V-COLLIDE: Accelerated Collision Detection for VRML
Collision detection is essential for many applications involving simulation, behavior and animation. However, it has been regarded as a computationallydemanding task and is often ...
Thomas C. Hudson, Ming C. Lin, Jonathan D. Cohen, ...
GRID
2007
Springer
15 years 7 months ago
Multi-objective planning for workflow execution on Grids
Utility Grids create an infrastructure for enabling users to consume services transparently over a global network. When optimizing workflow execution on utility Grids, we need to c...
Jia Yu, Michael Kirley, Rajkumar Buyya