Sciweavers

9504 search results - page 1861 / 1901
» Dynamic Substitution Model
Sort
View
SIGCOMM
1994
ACM
13 years 11 months ago
An Architecture for Wide-Area Multicast Routing
Existing multicast routing mechanisms were intended for use within regions where a group is widely represented or bandwidth is universally plentiful. When group members, and sende...
Stephen E. Deering, Deborah Estrin, Dino Farinacci...
CF
2007
ACM
13 years 11 months ago
An analysis of the effects of miss clustering on the cost of a cache miss
In this paper we describe a new technique, called pipeline spectroscopy, and use it to measure the cost of each cache miss. The cost of a miss is displayed (graphed) as a histogra...
Thomas R. Puzak, Allan Hartstein, Philip G. Emma, ...
CANDC
2009
ACM
13 years 11 months ago
Computational and cognitive infrastructures of stigma: empowering identity in social computing and gaming
Computing technologies such as games, social networking sites, and virtual environments often reproduce forms of social stigma encountered in everyday real life, as well as introd...
D. Fox Harrell
CONEXT
2007
ACM
13 years 11 months ago
Proactive replication in distributed storage systems using machine availability estimation
Distributed storage systems provide data availability by means of redundancy. To assure a given level of availability in case of node failures, new redundant fragments need to be ...
Alessandro Duminuco, Ernst Biersack, Taoufik En-Na...
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
13 years 11 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
« Prev « First page 1861 / 1901 Last » Next »