Sciweavers

8135 search results - page 1623 / 1627
» networking 2008
Sort
View
82
Voted
CORR
2008
Springer
107views Education» more  CORR 2008»
15 years 10 days ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg
119
Voted
CORR
2008
Springer
185views Education» more  CORR 2008»
15 years 10 days ago
Realizing Fast, Scalable and Reliable Scientific Computations in Grid Environments
The practical realization of managing and executing large scale scientific computations efficiently and reliably is quite challenging. Scientific computations often invo...
Yong Zhao, Ioan Raicu, Ian T. Foster, Mihael Hateg...
130
Voted
FGCS
2008
109views more  FGCS 2008»
15 years 9 days ago
Gridification of collaborative audiovisual organizations through the MediaGrid framework
Abstract In this publication, we discuss a use case for employing Grid technology in a media production / distribution environment. This type of environment is faced with the chall...
Bruno Volckaert, Tim Wauters, Marc De Leenheer, Pi...
107
Voted
CORR
2007
Springer
122views Education» more  CORR 2007»
15 years 6 days ago
Social Media as Windows on the Social Life of the Mind
This is a programmatic paper, marking out two directions in which the study of social media can contribute to broader problems of social science: understanding cultural evolution ...
Cosma Rohilla Shalizi
93
Voted
MTA
2008
83views more  MTA 2008»
15 years 6 days ago
Caching collaboration and cache allocation in peer-to-peer video systems
Providing scalable video services in a peer-to-peer (P2P) environment is challenging. Since videos are typically large and require high communication bandwidth for delivery, many ...
Ying Cai, Zhan Chen, Wallapak Tavanapong
« Prev « First page 1623 / 1627 Last » Next »