Sciweavers

4164 search results - page 819 / 833
» Application and desktop sharing
Sort
View
CCR
2004
91views more  CCR 2004»
13 years 9 months ago
New techniques for making transport protocols robust to corruption-based loss
Current congestion control algorithms treat packet loss as an indication of network congestion, under the assumption that most losses are caused by router queues overflowing. In r...
Wesley M. Eddy, Shawn Ostermann, Mark Allman
CCR
2002
112views more  CCR 2002»
13 years 9 months ago
New directions in traffic measurement and accounting
Accurate network traffic measurement is required for accounting, bandwidth provisioning and detecting DoS attacks. These applications see the traffic as a collection of flows they...
Cristian Estan, George Varghese
CONCURRENCY
2002
230views more  CONCURRENCY 2002»
13 years 9 months ago
Economic models for resource management and scheduling in Grid computing
: The accelerated development in Peer-to-Peer (P2P) and Grid computing has positioned them as promising next generation computing platforms. They enable the creation of Virtual Ent...
Rajkumar Buyya, David Abramson, Jonathan Giddy, He...
DSS
2000
113views more  DSS 2000»
13 years 9 months ago
Quality of service provision in noncooperative networks with diverse user requirements
This paper studies the quality of service (QoS) provision problem in noncooperative networks where applications or users are sel sh and routers implement generalized processor sha...
K. Park, M. Sitharam, S. Chen
CORR
2002
Springer
95views Education» more  CORR 2002»
13 years 9 months ago
Unsupervised Learning of Morphology without Morphemes
The first morphological learner based upon the theory of Whole Word Morphology (Ford et al., 1997) is outlined, and preliminary evaluation results are presented. The program, Whol...
Sylvain Neuvel, Sean A. Fulop