Sciweavers

362 search results - page 55 / 73
» The next frontier for communications networks: power managem...
Sort
View
ASPLOS
1998
ACM
15 years 1 months ago
A Cost-Effective, High-Bandwidth Storage Architecture
This paper describes the Network-Attached Secure Disk (NASD) storage architecture, prototype implementations of NASD drives, array management for our architecture, and three files...
Garth A. Gibson, David Nagle, Khalil Amiri, Jeff B...
MOBIWAC
2009
ACM
15 years 4 months ago
The sociable traveller: human travelling patterns in social-based mobility
Understanding how humans move is a key factor for the design and evaluation of networking protocols and mobility management solutions in mobile networks. This is particularly true...
Chiara Boldrini, Marco Conti, Andrea Passarella
IMC
2010
ACM
14 years 7 months ago
What happened in my network: mining network events from router syslogs
Router syslogs are messages that a router logs to describe a wide range of events observed by it. They are considered one of the most valuable data sources for monitoring network ...
Tongqing Qiu, Zihui Ge, Dan Pei, Jia Wang, Jun Xu
SIGMOD
2002
ACM
236views Database» more  SIGMOD 2002»
15 years 9 months ago
The Cougar Approach to In-Network Query Processing in Sensor Networks
The widespread distribution and availability of smallscale sensors, actuators, and embedded processors is transforming the physical world into a computing platform. One such examp...
Yong Yao, Johannes Gehrke
85
Voted
GLOBECOM
2007
IEEE
15 years 3 months ago
Exit Policy Violations in Multi-Hop Overlay Routes: Analysis and Mitigation
— The traffic exchanged between two overlay nodes in different autonomous systems (AS) is always subjected to a series of inter-domain policies. However, overlay routing often m...
Srinivasan Seetharaman, Mostafa H. Ammar