Sciweavers

2913 search results - page 444 / 583
» How Much to Copy
Sort
View
ANOR
2006
79views more  ANOR 2006»
13 years 9 months ago
Top percentile network pricing and the economics of multi-homing
Under multi-homing an Internet Service Provider (ISP) connects to the Internet via multiplicity of network providers. This allows the provider to receive proper quality of service...
Joseph Levy, Hanoch Levy, Yaron Kahana
EOR
2008
52views more  EOR 2008»
13 years 9 months ago
Competitive online scheduling of perfectly malleable jobs with setup times
We study how to efficiently schedule online perfectly malleable parallel jobs with arbitrary arrival times on m 2 processors. We take into account both the linear speedup of such...
Jessen T. Havill, Weizhen Mao
CCR
2006
82views more  CCR 2006»
13 years 9 months ago
Why flow-completion time is the right metric for congestion control
Users typically want their flows to complete as quickly as possible: They want a web-page to download quickly, or a file transfer to complete as rapidly as possible. In other words...
Nandita Dukkipati, Nick McKeown
CN
2006
80views more  CN 2006»
13 years 9 months ago
Delay bound and packet scale rate guarantee for some expedited forwarding networks
Expedited Forwarding (EF) is a service defined under the Differentiated Services framework. Based on its recently revised definition in IETF RFC 3246, Packet Scale Rate Guarantee ...
Yuming Jiang
COMPSEC
2006
110views more  COMPSEC 2006»
13 years 9 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...