Sciweavers

208 search results - page 36 / 42
» A distributed shared buffer space for data-intensive applica...
Sort
View
JSAC
2007
97views more  JSAC 2007»
13 years 7 months ago
R2: Random Push with Random Network Coding in Live Peer-to-Peer Streaming
— In information theory, it has been shown that network coding can effectively improve the throughput of multicast communication sessions in directed acyclic graphs. More practic...
Mea Wang, Baochun Li
ECOOPW
1999
Springer
14 years 5 days ago
J-Kernel: A Capability-Based Operating System for Java
Safe language technology can be used for protection within a single address space. This protection is enforced by the language’s type system, which ensures that references to obj...
Thorsten von Eicken, Chi-Chao Chang, Grzegorz Czaj...
ISCA
2010
IEEE
236views Hardware» more  ISCA 2010»
14 years 29 days ago
Elastic cooperative caching: an autonomous dynamically adaptive memory hierarchy for chip multiprocessors
Next generation tiled microarchitectures are going to be limited by off-chip misses and by on-chip network usage. Furthermore, these platforms will run an heterogeneous mix of ap...
Enric Herrero, José González, Ramon ...
IDEAS
2003
IEEE
131views Database» more  IDEAS 2003»
14 years 1 months ago
Neighborhood Signatures for Searching P2P Networks
Overlay networks have received a lot of attention due to the recent wide-spread use of peer-to-peer (P2P) applications such as SETI, Napster, Gnutella, and Morpheus. Through repli...
Mei Li, Wang-Chien Lee, Anand Sivasubramaniam
ICPADS
2006
IEEE
14 years 1 months ago
XYZ: A Scalable, Partially Centralized Lookup Service for Large-Scale Peer-to-Peer Systems
Peer-to-Peer (P2P) systems are characterized by direct access between peer computers, rather than through a centralized server. File sharing is the dominant P2P application on the...
Jianying Zhang, Jie Wu