Spelling suggestions: "subject:"computer betworks"" "subject:"computer conetworks""
281 |
Functionally homogeneous clustering : a framework for building scalable data-intensive internet services /Saito, Yasushi, January 2001 (has links)
Thesis (Ph. D.)--University of Washington, 2001. / Vita. Includes bibliographical references (p. 137-149).
|
282 |
Security and efficiency concerns with distributed collaborative networking environments /Felker, Keith A. January 2003 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2003. / Thesis advisor(s): Geoffrey Xie, John Gibson. Includes bibliographical references (p. 93-99). Also available online.
|
283 |
Gossip-based publish-subscribe systems in peer-to-peer networksZhang, Xin, 张昕 January 2014 (has links)
Peer-to-peer (P2P) paradigm, for its scalability and low cost management, is widely used in today’s network. Based on the typical designs for request/response services, a lot of efforts have been made to support publish-subscribe services in P2P networks. Gossip-based publish-subscribe system, which is commonly used in unstructured P2P networks, can provide great flexibility in query language and does not require special efforts on maintaining topology. The purpose of our work is to investigate effective and efficient mechanisms to build gossip-based publish-subscribe systems in unstructured P2P networks. Specifically, the probabilistic bi-quorum system (PBQS), for its assurance in effectiveness, becomes the object of our study.
Uniform sampling is a fundamental tool to construct PBQS. By adopting uniform sampling, PBQS provides a bound on the likelihood that data messages will find a copy of the subscription. A random walk of length O(log n) is commonly used to gain a uniform sample on an expander graph of size n. To obtain a multitude of uniform samples thus requires an equivalent number of random walks of length O(log n) each. A number of works have relied on the Chernoff bound to analytically reduce the overhead needed to obtain a multitude of uniform samples. Besides, researchers have also shown that it is not necessary to replicate both data and query on uniformly chosen nodes. Alternatively, BubbleStorm performs controlled flooding on a constructed overlay to build PBQS. BubbleStorm does not require nodes forming a bubble to be uniformly chosen at random, and the probabilistic bound computed by BubbleStorm is different from uniform sampling based PBQS.
In this thesis, we first show that the Chernoff bound on the statistical properties of samples collected from a random walk does not help in selecting uniformly random nodes. We then re-examine the role of uniform sampling in PBQS, and found that when multiple data answer a single subscription, it is sufficient and necessary for each data to be distributed uniformly at random. Looking into BubbleStorm, we examine more closely the probabilistic bound provided by this system. We found that, unlike uniform sampling based PBQS, the bubble intersection in BubbleStorm is distance dependent. Given a specific pair of publisher-subscriber, the data may never find the subscription. We further investigate the topology construction and found that re-creating topology prior to each controlled flooding or keeping topology with high degree of churn can help alleviate the distance dependency problem. We arrive at the conclusion that BubbleStorm construction is equivalent to caching of random walks. We show that re-using this cache to obtain samples over time leads to degradation of uniformity of the samples. We evaluate topology re-wiring as a simple method to keep the cache fresh, thereby benefiting from the low latency of controlled flooding without degrading the uniformity of samples over time. / published_or_final_version / Electrical and Electronic Engineering / Master / Master of Philosophy
|
284 |
Issues in the ongoing operation and maintenance of the organizational intranetBarwell, Janet Maureen 10 May 2011 (has links)
Not available / text
|
285 |
Opportunistic interfaces for promoting community awarenessZhao, Qiang Alex January 2001 (has links)
No description available.
|
286 |
Routing and multicasting in satellite IP networksEkici, Eylem 05 1900 (has links)
No description available.
|
287 |
Multicast security in mobile ad hoc networks /Nguyen, Hoang Lan. January 2006 (has links)
Thesis (M.Sc.)--York University, 2006. Graduate Programme in Computer Science. / Typescript. Includes bibliographical references (leaves81-86). Also available on the Internet. MODE OF ACCESS via web browser by entering the following URL: http://proquest.umi.com/pqdweb?index=4&did=1240708341&SrchMode=1&sid=2&Fmt=2&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1194977884&clientId=5220
|
288 |
A space-efficient wireless mesh network : architecture, frequency planning and routing /Gao, Xin. January 2008 (has links)
Thesis (M.Phil.)--Hong Kong University of Science and Technology, 2008. / Includes bibliographical references (leaves 83-86). Also available in electronic version.
|
289 |
MOLE : multi-hop object location in wireless mesh networks /Chan, Michael Chi Fung. January 2008 (has links)
Thesis (M.Phil.)--Hong Kong University of Science and Technology, 2008. / Includes bibliographical references (leaves 46-52). Also available in electronic version.
|
290 |
End-to-end network measurement and its applications in peer-to-peer networks /Hei, Xiaojun. January 2008 (has links)
Thesis (Ph.D.)--Hong Kong University of Science and Technology, 2008. / Includes bibliographical references (leaves 146-155). Also available in electronic version.
|
Page generated in 0.0621 seconds