Sciweavers

226 search results - page 38 / 46
» Application of Java-Technologies for Simulation in the Web
Sort
View
NDSS
2008
IEEE
14 years 2 months ago
Taming the Devil: Techniques for Evaluating Anonymized Network Data
Anonymization plays a key role in enabling the public release of network datasets, and yet there are few, if any, techniques for evaluating the efficacy of network data anonymiza...
Scott E. Coull, Charles V. Wright, Angelos D. Kero...
INFOCOM
2007
IEEE
14 years 1 months ago
When TCP Friendliness Becomes Harmful
Abstract— Short TCP flows may suffer significant responsetime performance degradations during network congestion. Unfortunately, this creates an incentive for misbehavior by cl...
Amit Mondal, Aleksandar Kuzmanovic
EUROPAR
2007
Springer
14 years 1 months ago
Asynchronous Distributed Power Iteration with Gossip-Based Normalization
The dominant eigenvector of matrices defined by weighted links in overlay networks plays an important role in many peer-to-peer applications. Examples include trust management, im...
Márk Jelasity, Geoffrey Canright, Kenth Eng...
ISCA
2005
IEEE
154views Hardware» more  ISCA 2005»
14 years 1 months ago
Temporal Streaming of Shared Memory
Coherent read misses in shared-memory multiprocessors account for a substantial fraction of execution time in many important scientific and commercial workloads. We propose Tempor...
Thomas F. Wenisch, Stephen Somogyi, Nikolaos Harda...
ISCIS
2003
Springer
14 years 24 days ago
Virtual Interval Caching Scheme for Interactive Multimedia Streaming Workload
Abstract. We carefully believe that server workload for interactive multimedia service exhibits different characteristics from legacy application, e.g. ftp server, web server, ASP...
Kyoungwoon Cho, Yeonseung Ryu, Youjip Won, Kern Ko...