Sciweavers

822 search results - page 164 / 165
» Contention in shared memory algorithms
Sort
View
CCR
2004
91views more  CCR 2004»
13 years 7 months ago
New techniques for making transport protocols robust to corruption-based loss
Current congestion control algorithms treat packet loss as an indication of network congestion, under the assumption that most losses are caused by router queues overflowing. In r...
Wesley M. Eddy, Shawn Ostermann, Mark Allman
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
13 years 6 months ago
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks
Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities. A critical problem in a crisis situation is how t...
Li Zheng, Chao Shen, Liang Tang, Tao Li, Steven Lu...
PIMRC
2010
IEEE
13 years 5 months ago
Contact surround in opportunistic networks
Abstract--Is the temporal dimension alone sufficient to characterize contacts in opportunistic networks? Several studies analyze the temporal aspect of contacts with significant re...
Nadjet Belblidia, Marcelo Dias de Amorim, Jeremie ...
TPDS
2010
109views more  TPDS 2010»
13 years 2 months ago
Incentivized Peer-Assisted Streaming for On-Demand Services
As an efficient distribution mechanism, Peer-to-Peer (P2P) technology has become a tremendously attractive solution to offload servers in large-scale video streaming applications. ...
Chao Liang, Zhenghua Fu, Yong Liu, Chai Wah Wu
SIGIR
2011
ACM
12 years 10 months ago
Learning search tasks in queries and web pages via graph regularization
As the Internet grows explosively, search engines play a more and more important role for users in effectively accessing online information. Recently, it has been recognized that ...
Ming Ji, Jun Yan, Siyu Gu, Jiawei Han, Xiaofei He,...