Sciweavers

660 search results - page 108 / 132
» A general filter for measurements with any probability distr...
Sort
View
CCGRID
2005
IEEE
14 years 1 months ago
Fast pattern-based throughput prediction for TCP bulk transfers
The ability to quickly predict the throughput of a TCP transfer between a client and a server, or between peers, has wide application in scientific computing and commercial compu...
Tsung-i Huang, Jaspal Subhlok
NOSSDAV
2004
Springer
14 years 29 days ago
A framework for architecting peer-to-peer receiver-driven overlays
This paper presents a simple and scalable framework for architecting peer-to-peer overlays called Peer-to-peer Receiverdriven Overlay (or PRO). PRO is designed for non-interactive...
Reza Rejaie, Shad Stafford
IDEAL
2010
Springer
13 years 5 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...
MOBICOM
2004
ACM
14 years 1 months ago
Choosing beacon periods to improve response times for wireless HTTP clients
The IEEE 802.11 wireless LAN standard power-saving mode (PSM) allows the network interface card (NIC) to periodically sleep between receiving data. In this paper, we show that 802...
Suman Nath, Zachary R. Anderson, Srinivasan Seshan
PLDI
2003
ACM
14 years 26 days ago
Predicting whole-program locality through reuse distance analysis
Profiling can accurately analyze program behavior for select data inputs. We show that profiling can also predict program locality for inputs other than profiled ones. Here loc...
Chen Ding, Yutao Zhong