Sciweavers

329 search results - page 25 / 66
» The Dangers of Replication and a Solution
Sort
View
NSDI
2004
15 years 3 months ago
Beehive: O(1) Lookup Performance for Power-Law Query Distributions in Peer-to-Peer Overlays
Structured peer-to-peer hash tables provide decentralization, self-organization, failure-resilience, and good worst-case lookup performance for applications, but suffer from high ...
Venugopalan Ramasubramanian, Emin Gün Sirer
WSC
2004
15 years 3 months ago
Optimal Computing Budget Allocation for Multi-Objective Simulation Models
Simulation plays a vital role in identifying the best system design from among a set of competing designs. To improve simulation efficiency, ranking and selection techniques are o...
Loo Hay Lee, Ek Peng Chew, Suyan Teng, David Golds...
IEEEICCI
2003
IEEE
15 years 7 months ago
Automatic Concept Evolution
An evolutionary algorithm can be used by a distributed group of interacting people to produce the solution to a problem. First the problem must be defined. Each member of the grou...
Terence C. Fogarty
HICSS
2008
IEEE
106views Biometrics» more  HICSS 2008»
15 years 8 months ago
Of Paper Trails and Voter Receipts
The Internet pervades virtually every aspect of our daily lives, and it seems there is no area that is immune from computing solutions. Computers can do things faster, with greate...
Alec Yasinsac, Matt Bishop
NCA
2007
IEEE
15 years 8 months ago
Transparent Reliable Multicast for Ethernet-Based Storage Area Networks
As disk storage density increases and data availability requirements become ever more demanding, data replication is increasingly an indispensable feature of enterprise-class stor...
Shibiao Lin, Maohua Lu, Tzi-cker Chiueh