Sciweavers

119 search results - page 13 / 24
» Can We Ever Escape from Data Overload
Sort
View
IAJIT
2010
87views more  IAJIT 2010»
13 years 6 months ago
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
: Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermed...
Khalid Abu Al-Saud, Hatim Mohd Tahir, Moutaz Saleh...
SPAA
2009
ACM
14 years 4 months ago
Optimizing transactions for captured memory
In this paper, we identify transaction-local memory as a major source of overhead from compiler instrumentation in software transactional memory (STM). Transaction-local memory is...
Aleksandar Dragojevic, Yang Ni, Ali-Reza Adl-Tabat...
CLUSTER
2002
IEEE
13 years 7 months ago
Internal Node and Shortcut Based Routing with Guaranteed Delivery in Wireless Networks
Several distributed routing algorithms for wireless networks were described recently, based on location information of nodes available via Global Positioning System (GPS). In gree...
Susanta Datta, Ivan Stojmenovic, Jie Wu
ICOIN
2001
Springer
14 years 12 hour ago
A Proxy Caching Scheme for Continuous Media Streams on the Internet
The Internet has enabled the dissemination and access of vast amounts of information to be easy. But dramatic increases of the number of users of Internet cause server overload, n...
Eun-Ji Lim, Seong-Ho Park, Hyeon-Ok Hong, Ki-Dong ...
DSN
2007
IEEE
14 years 1 months ago
Scaling and Continuous Availability in Database Server Clusters through Multiversion Replication
In this paper, we study replication techniques for scaling and continuous operation for a dynamic content server. Our focus is on supporting transparent and fast reconfiguration ...
Kaloian Manassiev, Cristiana Amza