Sciweavers

7457 search results - page 1383 / 1492
» The Dynamics of Computing Agent Systems
Sort
View
NDSS
2008
IEEE
15 years 8 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
ICPP
2007
IEEE
15 years 8 months ago
Analyzing and Minimizing the Impact of Opportunity Cost in QoS-aware Job Scheduling
Quality of service (QoS) mechanisms allowing users to request for turn-around time guarantees for their jobs have recently generated much interest. In our previous work we had des...
Mohammad Islam, Pavan Balaji, Gerald Sabin, P. Sad...
PODC
2006
ACM
15 years 7 months ago
Adversarial queuing on the multiple-access channel
We consider deterministic distributed broadcasting on multiple access channels in the framework of adversarial queuing. Packets are injected dynamically by an adversary that is co...
Bogdan S. Chlebus, Dariusz R. Kowalski, Mariusz A....
JCDL
2005
ACM
152views Education» more  JCDL 2005»
15 years 7 months ago
In the company of readers: the digital library book as "practiced place"
Most digital libraries (DLs) necessarily focus on the complex issues that arise when library collections are freed from their physical anchors in buildings and on paper. Typical i...
Nancy Kaplan, Yoram Chisik
146
Voted
PODC
2004
ACM
15 years 7 months ago
Balanced binary trees for ID management and load balance in distributed hash tables
We present a low-cost, decentralized algorithm for ID management in distributed hash tables (DHTs) managed by a dynamic set of hosts. Each host is assigned an ID in the unit inter...
Gurmeet Singh Manku
« Prev « First page 1383 / 1492 Last » Next »