Sciweavers

1272 search results - page 209 / 255
» Blocking in All-Optical Networks
Sort
View
MMNS
2001
151views Multimedia» more  MMNS 2001»
13 years 10 months ago
Analysis of Random Access Protocol under Bursty Traffic
Aloha-type random-access protocols have been employed as access control protocols in wireline and wireless, stationary and mobile, multiple-access communications networks. They are...
Jianbo Gao, Izhak Rubin
CONEXT
2009
ACM
13 years 9 months ago
FairTorrent: bringing fairness to peer-to-peer systems
Peer-to-Peer file-sharing applications suffer from a fundamental problem of unfairness. Free-riders cause slower download times for others by contributing little or no upload band...
Alex Sherman, Jason Nieh, Clifford Stein
ANCS
2010
ACM
13 years 6 months ago
A new TCB cache to efficiently manage TCP sessions for web servers
TCP/IP, the most commonly used network protocol, consumes a significant portion of time in Internet servers. While a wide spectrum of studies has been done to reduce its processin...
Guangdeng Liao, Laxmi N. Bhuyan, Wei Wu, Heeyeol Y...
BMCBI
2008
112views more  BMCBI 2008»
13 years 8 months ago
Predicting the Interactome of Xanthomonas oryzae pathovar oryzae for target selection and DB service
Background: Protein-protein interactions (PPIs) play key roles in various cellular functions. In addition, some critical inter-species interactions such as host-pathogen interacti...
Jeong-Gu Kim, Daeui Park, Byoung-Chul Kim, Seong-W...
ICDE
2007
IEEE
151views Database» more  ICDE 2007»
14 years 10 months ago
Fast, Secure Encryption for Indexing in a Column-Oriented DBMS
Networked information systems require strong security guarantees because of the new threats that they face. Various forms of encryption have been proposed to deal with this proble...
Tingjian Ge, Stanley B. Zdonik