Sciweavers

1632 search results - page 70 / 327
» Topological Analysis of Refinement
Sort
View
JSAC
2007
116views more  JSAC 2007»
14 years 10 months ago
Outreach: peer-to-peer topology construction towards minimized server bandwidth costs
Abstract— On-demand and live multimedia streaming applications (such as Internet TV) are well known to utilize a significant amount of bandwidth from media streaming servers, es...
Tara Small, Baochun Li, Ben Liang
AOSE
2003
Springer
15 years 3 months ago
Activity Theory for the Analysis and Design of Multi-agent Systems
This paper shows how to verify a Multi-Agent System specification using human organization metaphors. This proposal applies Activity Theory, which has its roots in Sociology, to st...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...
SEC
2008
15 years 8 hour ago
ASTRA : A Security Analysis Method Based on Asset Tracking
ASTRA is a security analysis method based on the systematic collection and analysis of security relevant information to detect inconsistencies and assess residual risks. ASTRA can ...
Daniel Le Métayer, Claire Loiseaux
HPDC
2007
IEEE
15 years 4 months ago
A fast topology inference: a building block for network-aware parallel processing
Adapting to the network is the key to achieving high performance for communication-intensive applications, including scientific computing, data intensive computing, and multicast...
Tatsuya Shirai, Hideo Saito, Kenjiro Taura
JSAC
2006
130views more  JSAC 2006»
14 years 10 months ago
Performance Preserving Topological Downscaling of Internet-Like Networks
Abstract--The Internet is a large, heterogeneous system operating at very high speeds and consisting of a large number of users. Researchers use a suite of tools and techniques in ...
Fragkiskos Papadopoulos, Konstantinos Psounis, Ram...