Sciweavers

289 search results - page 20 / 58
» File Sharing Using IP-Multicast
Sort
View
CONEXT
2008
ACM
13 years 9 months ago
EGOIST: overlay routing using selfish neighbor selection
A foundational issue underlying many overlay network applications ranging from routing to peer-to-peer file sharing is that of connectivity management, i.e., folding new arrivals ...
Georgios Smaragdakis, Vassilis Lekakis, Nikolaos L...
MONET
2008
129views more  MONET 2008»
13 years 6 months ago
Link Layer Adaptation for Shared Wireless Links
While traditional link layer protocols assume that they fully control the underlying link, in contemporary wireless networks the link may be dynamically shared by sessions belongin...
George Xylomenos, Michael Makidis
ICSE
2009
IEEE-ACM
14 years 3 days ago
An Empirical Study of Testing File-System-Dependent Software with Mock Objects
Unit testing is a technique of testing a single unit of a program in isolation. The testability of the unit under test can be reduced when the unit interacts with its environment....
Madhuri R. Marri, Tao Xie, Nikolai Tillmann, Jonat...
SSDBM
2000
IEEE
149views Database» more  SSDBM 2000»
13 years 12 months ago
Coordinating Simultaneous Caching of File Bundles from Tertiary Storage
In a previous paper [Shoshani et al 99], we described a system called STACS (Storage Access Coordination System) for High Energy and Physics (HEP) experiments. These experiments g...
Arie Shoshani, Alex Sim, Luis M. Bernardo, Henrik ...
SISW
2005
IEEE
14 years 1 months ago
Lazy Revocation in Cryptographic File Systems
A crucial element of distributed cryptographic file systems are key management solutions that allow for flexible but secure data sharing. We consider efficient key management s...
Michael Backes, Christian Cachin, Alina Oprea