Sciweavers

4045 search results - page 200 / 809
» Special Section on Parallel Distributed Computing and Networ...
Sort
View
90
Voted
GPC
2009
Springer
14 years 8 months ago
Integrity Assurance Technique Using Determinant Approach
Data integrity is an important aspect of storage security and reliability which are prerequisite for most computer systems and network applications. This paper proposes a new tech...
Jasim A. Ghaeb
80
Voted
HCW
1999
IEEE
15 years 2 months ago
Are CORBA Services Ready to Support Resource Management Middleware for Heterogeneous Computing?
The goal of this paper is to report our ndings as to which CORBA services are ready to support distributed system software in a heterogeneous environment. In particular, we implem...
Alpay Duman, Debra A. Hensgen, David St. John, Tay...
IPPS
2009
IEEE
15 years 4 months ago
On the tradeoff between playback delay and buffer space in streaming
We consider the following basic question: a source node wishes to stream an ordered sequence of packets to a collection of receivers, which are distributed among a number of clust...
Alix L. H. Chow, Leana Golubchik, Samir Khuller, Y...
EDOC
2002
IEEE
15 years 3 months ago
Constraint Based Network Adaptation for Ubiquitous Applications
In this paper, we present a constraint-based approach for selecting and deploying active network components, called proxylets, which execute on servers within the network to perfo...
Krish T. Krishnakumar, Morris Sloman
CIKM
1997
Springer
15 years 2 months ago
Learning Belief Networks from Data: An Information Theory Based Approach
This paper presents an efficient algorithm for learning Bayesian belief networks from databases. The algorithm takes a database as input and constructs the belief network structur...
Jie Cheng, David A. Bell, Weiru Liu