Sciweavers

1196 search results - page 160 / 240
» High Availability and Scalability Support for Web Applicatio...
Sort
View
DATE
2007
IEEE
142views Hardware» more  DATE 2007»
14 years 3 months ago
Optimizing instruction-set extensible processors under data bandwidth constraints
We present a methodology for generating optimized architectures for data bandwidth constrained extensible processors. We describe a scalable Integer Linear Programming (ILP) formu...
Kubilay Atasu, Robert G. Dimond, Oskar Mencer, Way...
ICC
2007
IEEE
111views Communications» more  ICC 2007»
14 years 3 months ago
On Ameliorating the Perceived Playout Quality in Chunk-Driven P2P Media Streaming Systems
— Media streaming applications are becoming very popular in the Internet world. Since they mainly rely on a not scalable client/server model, the P2P model is receiving more and ...
Marco Furini
CC
2008
Springer
107views System Software» more  CC 2008»
13 years 11 months ago
How to Do a Million Watchpoints: Efficient Debugging Using Dynamic Instrumentation
Application debugging is a tedious but inevitable chore in any software development project. An effective debugger can make programmers more productive by allowing them to pause ex...
Qin Zhao, Rodric M. Rabbah, Saman P. Amarasinghe, ...
CCR
1998
137views more  CCR 1998»
13 years 8 months ago
Experience with control mechanisms for packet video in the internet
The single class best effort service available in the current Internet does not provide the guarantees, typically expressed in terms of minimum bandwidth and/or maximum delay or l...
Jean-Chrysostome Bolot, Thierry Turletti
ICOIN
2001
Springer
14 years 1 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae