Sciweavers

1192 search results - page 205 / 239
» Computing Weakest Readings
Sort
View
P2P
2008
IEEE
137views Communications» more  P2P 2008»
15 years 10 months ago
Hierarchical Codes: How to Make Erasure Codes Attractive for Peer-to-Peer Storage Systems
Redundancy is the basic technique to provide reliability in storage systems consisting of multiple components. A redundancy scheme defines how the redundant data are produced and...
Alessandro Duminuco, Ernst Biersack
130
Voted
ICDCS
2007
IEEE
15 years 10 months ago
Secure Event Dissemination in Publish-Subscribe Networks
Abstract. Content-based publish-subscribe (pub-sub) systems are an emerging paradigm for building large-scale information delivery systems. Secure event dissemination in a pub-sub ...
Mudhakar Srivatsa, Ling Liu
122
Voted
ICPP
2007
IEEE
15 years 10 months ago
Multi-Layer Event Trace Analysis for Parallel I/O Performance Tuning
The complexity of parallel I/O systems lies in the deep I/O stack with many software layers and concurrent I/O request handling at multiple layers. This paper explores multi-layer...
Pin Lu, Kai Shen
123
Voted
IPPS
2006
IEEE
15 years 9 months ago
A simulation study of the effects of multi-path approaches in e-commerce applications
Response time is a key factor of any e-Commerce application, and a set of solutions have been proposed to provide low response time despite network congestions or failures. Being ...
Paolo Romano, Francesco Quaglia, Bruno Ciciani
128
Voted
IMC
2006
ACM
15 years 9 months ago
Semi-automated discovery of application session structure
While the problem of analyzing network traffic at the granularity of individual connections has seen considerable previous work and tool development, understanding traffic at a ...
Jayanthkumar Kannan, Jaeyeon Jung, Vern Paxson, Ca...