Sciweavers

2057 search results - page 165 / 412
» From content distribution networks to content networks - iss...
Sort
View
ACMSE
2006
ACM
14 years 2 months ago
Assessing denial of service vulnerabilities in DOCSIS
In previous work a DOCSIS model was added to ‘ns’ to allow simulations to be run to analyze the performance of DOCSIS. These simulations showed that congestion caused by the a...
Scott Moser, Jim Martin
SC
2000
ACM
14 years 20 days ago
MPICH-GQ: Quality-of-Service for Message Passing Programs
Parallel programmers typically assume that all resources required for a program’s execution are dedicated to that purpose. However, in local and wide area networks, contention f...
Alain J. Roy, Ian T. Foster, William Gropp, Nichol...
INFOCOM
2009
IEEE
14 years 2 months ago
Towards Economically Viable Infrastructure-Based Overlay Multicast Networks
—Internet-scale dissemination of streaming contents (e.g., live sports games) can be achieved by infrastructure-based overlay multicast networks, where multicast service provider...
Varun Khare, Bo Zhang
USENIX
2003
13 years 9 months ago
CUP: Controlled Update Propagation in Peer-to-Peer Networks
— This paper proposes CUP, a protocol for performing Controlled Update Propagation to maintain caches of metadata in peer-to-peer networks. To moderate propagation without imposi...
Mema Roussopoulos, Mary Baker
SOCIALCOM
2010
13 years 6 months ago
Want to be Retweeted? Large Scale Analytics on Factors Impacting Retweet in Twitter Network
Retweeting is the key mechanism for information diffusion in Twitter. It emerged as a simple yet powerful way of disseminating information in the Twitter social network. Even thoug...
Bongwon Suh, Lichan Hong, Peter Pirolli, Ed H. Chi