Sciweavers

2913 search results - page 340 / 583
» How Much to Copy
Sort
View
132
Voted
WISEC
2010
ACM
15 years 10 months ago
Providing security with insecure systems
Abstract A Martian who arrived on Earth today would surely conclude that computing and communications security are in a crisis situation. The popular media as well as technical pub...
Andrew M. Odlyzko
125
Voted
IPPS
2009
IEEE
15 years 10 months ago
Revisiting communication performance models for computational clusters
—In this paper, we analyze restrictions of traditional models affecting the accuracy of analytical prediction of the execution time of collective communication operations. In par...
Alexey L. Lastovetsky, Vladimir Rychkov, Maureen O...
116
Voted
ICC
2008
IEEE
128views Communications» more  ICC 2008»
15 years 10 months ago
Experimental Analysis of Super-Seeding in BitTorrent
—With the popularity of BitTorrent, improving its performance has been an active research area. Super-seeding, a special upload policy for initial seeds, improves the efficiency ...
Zhijia Chen, Yang Chen, Chuang Lin, Vaibhav Nivarg...
115
Voted
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
15 years 10 months ago
Peeking Through the Cloud: DNS-Based Estimation and Its Applications
Reliable network demographics are quickly becoming a much sought-after digital commodity. However, as the need for more refined Internet demographics has grown, so too has the ten...
Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, ...
124
Voted
CODES
2007
IEEE
15 years 10 months ago
Channel trees: reducing latency by sharing time slots in time-multiplexed networks on chip
Networks on Chip (NoC) have emerged as the design paradigm for scalable System on Chip communication infrastructure. A growing number of applications, often with firm (FRT) or so...
Andreas Hansson, Martijn Coenen, Kees Goossens