Sciweavers

280 search results - page 13 / 56
» Connection strategies in neocortical networks
Sort
View
P2P
2008
IEEE
14 years 2 months ago
On the Impact of Greedy Strategies in BitTorrent Networks: The Case of BitTyrant
The success of BitTorrent has fostered the development of variants to its basic components. Some of the variants adopt greedy approaches aiming at exploiting the intrinsic altruis...
Damiano Carra, Giovanni Neglia, Pietro Michiardi
OPNETEC
2004
Springer
14 years 29 days ago
Routing and Wavelength Assignment for Scheduled and Random Lightpath Demands: Bifurcated Routing versus Non-Bifurcated Routing
: We consider the routing and the wavelength assignment (RWA) of scheduled and random lightpath demands in a wavelength switching mesh network without wavelength conversion functio...
Mohamed Koubàa, Nicolas Puech, Maurice Gagn...
CORR
2010
Springer
129views Education» more  CORR 2010»
13 years 7 months ago
Performance Analysis and Special Issues of Broadband Strategies in the Computer Communication
Broadband communications consists of the technologies and equipment required to deliver packetbased digital voice, video, and data services to end users. Broadband affords end use...
S. S. Riaz Ahamed, D. Mahesh
FUIN
2006
97views more  FUIN 2006»
13 years 7 months ago
Thread Algebra with Multi-Level Strategies
In a previous paper, we developed an algebraic theory about threads and multi-threading based on the assumption that a deterministic interleaving strategy determines how threads ar...
Jan A. Bergstra, C. A. Middelburg
DSN
2000
IEEE
14 years 18 hour ago
Data Replication Strategies for Fault Tolerance and Availability on Commodity Clusters
Recent work has shown the advantages of using persistent memory for transaction processing. In particular, the Vista transaction system uses recoverable memory to avoid disk I/O, ...
Cristiana Amza, Alan L. Cox, Willy Zwaenepoel