Sciweavers

1583 search results - page 199 / 317
» The Quorum Deployment Problem
Sort
View
ICPP
2007
IEEE
15 years 4 months ago
Achieving Reliability through Replication in a Wide-Area Network DHT Storage System
It is a challenge to design and implement a wide-area distributed hash table (DHT) which provides a storage service with high reliability. Many existing systems use replication to...
Jing Zhao, Hongliang Yu, Kun Zhang, Weimin Zheng, ...
INFOCOM
2007
IEEE
15 years 4 months ago
Diagnosing Link-Level Anomalies Using Passive Probes
Abstract—In this paper, we develop passive network tomography techniques for inferring link-level anomalies like excessive loss rates and delay from path-level measurements. Our ...
Shipra Agrawal, K. V. M. Naidu, Rajeev Rastogi
INFOCOM
2007
IEEE
15 years 4 months ago
Neighborhood Watch for Internet Routing: Can We Improve the Robustness of Internet Routing Today?
— Protecting BGP routing from errors and malice is one of the next big challenges for Internet routing. Several approaches have been proposed that attempt to capture and block ro...
Georgos Siganos, Michalis Faloutsos
IPPS
2007
IEEE
15 years 4 months ago
RAxML-Cell: Parallel Phylogenetic Tree Inference on the Cell Broadband Engine
Computational phylogeny is a challenging application even for the most powerful supercomputers. It is also an ideal candidate for benchmarking emerging multiprocessor architecture...
Filip Blagojevic, Alexandros Stamatakis, Christos ...
SECON
2007
IEEE
15 years 4 months ago
Log-normal shadowing meets SINR: A numerical study of Capacity in Wireless Networks
— The capacity of wireless multi-hop networks has been studied extensively in recent years. Most existing work tackles the problem from an asymptotic perspective and assumes a si...
Patrick Stuedi, Gustavo Alonso